Received: by 2002:a89:b8d:0:b0:1ff:3fb7:5d92 with SMTP id br13csp9522lqb; Sun, 16 Jun 2024 06:15:29 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCU6OXptKRdMEBm6JsLOIosS9989e+IBNJjvrf8/lTTiosa9114+fTCIkdIzt8BxHZJ+buTPYRdVFGbA5xRC/6jRyc7QJ1fgYYULoF0p7A== X-Google-Smtp-Source: AGHT+IEQ324pc+eBS5GlYeXXZMos+U0vO1ZVt/4D7khwis3lgYU4V6vHay4Lz7euGWOXdDUcTk26 X-Received: by 2002:a05:6214:1874:b0:6b0:9479:cdd7 with SMTP id 6a1803df08f44-6b2afd912ebmr76109916d6.54.1718543729750; Sun, 16 Jun 2024 06:15:29 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718543729; cv=pass; d=google.com; s=arc-20160816; b=NWPV3qX/h7KNrvzg+462g9xs12fqkVPvx3Kv2BO1hDYNAt2ce4xpeaJeC6MmnKmSMv gm9A93C/6ZA3ADwPiq1WC+uMtfIWfbUlzkWEq31YXodGoXPmKqGT0x0HHUxpXuqGDRSn 4PtpnsU2/Go+fzCNpw1Nvq86pF5Fwb+v1eubuedIMSUaDLfLpHrYoHwZYDgQPf46WlRL H8xPkQLd84egvRpB83Qo2xKzO+Y6kLQL1WMX4yY4L3w0hN3Qo+ba8DMfYzUDit45qF7L UNHTcZVyRDyOyvhYI56K8IQSmwRsFZdHHcHaDHql2hiGGeZHSVcMv5aCNHn3e/gz77nK HoxQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=to:from:subject:message-id:date:mime-version:list-unsubscribe :list-subscribe:list-id:precedence; bh=Dx9XGixapP39Ox7f/jgxQWueZhqtHuY/+w4E333XOsg=; fh=aueiXuJOq06IfvDMyQYQg8LX2mJFlmzET5xAHuHNwi4=; b=If7DyPd+NgSUCrLRxIZqWWS0id7ERs0FJ4r6caqm7EgLQx8nAABpJvab8DjwpZQ1qj rr50+RleU3mJXkVWYW02c+Cs+pYiE4VoSLuZHMRLzhD2HI7IBHWZQLw/9Bo/0xFeZuYN C7xhdXkk89UousgIHYQCx+F++iOnKIyUZ0nCGhNl0/k9PUy6XHpRLnkdZmF+fx4lF9+M iPMfdH3f3SdCfiGr9KEFmUWykc3C6qE3+b9/jU9RJ8qjxI2CZKY0pP+HTjlhZsYt+OaG snGNTwGXQy4JSd06OtRyCILYIiDuPPBf+ee5exx5/RsdRDh/TzFwTFVjohxH6URdu4Fz 41uA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=m3kw2wvrgufz5godrsrytgd7.apphosting.bounces.google.com); spf=pass (google.com: domain of linux-kernel+bounces-216294-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-216294-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id 6a1803df08f44-6b2a5a1751dsi80566436d6.85.2024.06.16.06.15.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 16 Jun 2024 06:15:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-216294-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=m3kw2wvrgufz5godrsrytgd7.apphosting.bounces.google.com); spf=pass (google.com: domain of linux-kernel+bounces-216294-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-216294-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 6808C1C217AD for ; Sun, 16 Jun 2024 13:15:29 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 0E5A8188CCE; Sun, 16 Jun 2024 13:15:21 +0000 (UTC) Received: from mail-io1-f80.google.com (mail-io1-f80.google.com [209.85.166.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 14C0537165 for ; Sun, 16 Jun 2024 13:15:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.166.80 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718543720; cv=none; b=bKQyOzXh6H7q91FVBz6DBztuAJIAnawPtvOxDzpX3+wZEOy0F3uDvdYCJh2xGK4VlMzF4U0HGBHzAVeznVLMkx7hHpJtC3dHmWfeWU2G7RDGb9wIguJMo2iANf1dmSkgLaAzXSugeCRS9QyMyxv7v4oJzYQ66isYuvMbrE7aed8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718543720; c=relaxed/simple; bh=rujGMl43ds3KgPGEe7uVPBkGuPZoSnuts+m8Dz2+N+8=; h=MIME-Version:Date:Message-ID:Subject:From:To:Content-Type; b=gWoqSqjDKx6dP2XtogrLgtn1ir+OAgxPMLK+I/dyi6GxpHcTe/fpJZF3NerVqBg9vxla04RggPeczspzcL67qEose17P2nLVVtTYQTDHR4P6bsNW+gLtORBCOnbJQwGqXDQJOnB7WcvYmKS29fU9ZsyDnWL1mt6xsnCv89YGTuw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com; arc=none smtp.client-ip=209.85.166.80 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com Received: by mail-io1-f80.google.com with SMTP id ca18e2360f4ac-7e8e2ea7b4bso467334539f.0 for ; Sun, 16 Jun 2024 06:15:18 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718543718; x=1719148518; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=Dx9XGixapP39Ox7f/jgxQWueZhqtHuY/+w4E333XOsg=; b=bobf7xXP45+VA7dLQ+hkUW0NBm3vtOd5EsB3MNjHL50CHS1Aw9+JiK1zhjOOfyE3hU J92mgfS1KyRWlhOrd6+KD1az2KdBu6+NYqKS/24EDd2ihX4rQMINew/yjxCIIZaZlTg/ +UBDASwKOSzr11a0a/9bBhef2e1Imf5Ynmt6EpsyRtVja49Pz9ujlR/LqVbobg5CytDV +aQOyhVuYCpsCBworsAL0gAmlTm3Ip5VJ4n7j0R2EsrV5QVTBIAeTXC+vNGZg9SYK5A9 TzvxYz8I05DA6SQGSxtylN1Vdxe5+46r7JTa/pGxDkUtj18wXracEdgmHlz3Pi6s+lxQ WC6A== X-Forwarded-Encrypted: i=1; AJvYcCVWJJ5u02TIYjR20vsCyCt1f3Mh2plYnNK/oDKhkUMiCzRPLvvfKy8+v/BagISTmlE5ES2NZJjm4fuvJy88zBmN/jMLIH1vkrygdF9f X-Gm-Message-State: AOJu0Yy0hSxjxYl052wtEdmlCzgp3+kcLPSVigYmbJeiT89vU0tRVRdB kBArgMB6jxV2kar/Vtuu4CdM1T23uSOtBBhQP8odUdPE8WYkzSijulw1JV1e8hm+6ZuwZ/G3Aq2 JQBHql0XqQslhpbdUaBYs7dnUox5wzAzJT/F/t2sQ+2AFi5jLiADaoMg= Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Received: by 2002:a05:6638:1651:b0:4b9:8850:3dbf with SMTP id 8926c6da1cb9f-4b988504403mr68547173.4.1718543718266; Sun, 16 Jun 2024 06:15:18 -0700 (PDT) Date: Sun, 16 Jun 2024 06:15:18 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000dbc80e061b01a34f@google.com> Subject: [syzbot] [net?] [nfc?] KMSAN: uninit-value in nci_ntf_packet (3) From: syzbot To: davem@davemloft.net, edumazet@google.com, krzk@kernel.org, kuba@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, pabeni@redhat.com, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Hello, syzbot found the following issue on: HEAD commit: 614da38e2f7a Merge tag 'hid-for-linus-2024051401' of git:/.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1125e6fe980000 kernel config: https://syzkaller.appspot.com/x/.config?x=f5d2cbf33633f507 dashboard link: https://syzkaller.appspot.com/bug?extid=3f8fa0edaa75710cd66e compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 Unfortunately, I don't have any reproducer for this issue yet. Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/89eafb874b71/disk-614da38e.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/356000512ad9/vmlinux-614da38e.xz kernel image: https://storage.googleapis.com/syzbot-assets/839c73939115/bzImage-614da38e.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+3f8fa0edaa75710cd66e@syzkaller.appspotmail.com nci: nci_rf_discover_ntf_packet: unsupported rf_tech_and_mode 0x6e ===================================================== BUG: KMSAN: uninit-value in nci_rf_discover_ntf_packet net/nfc/nci/ntf.c:386 [inline] BUG: KMSAN: uninit-value in nci_ntf_packet+0x2ac8/0x39c0 net/nfc/nci/ntf.c:798 nci_rf_discover_ntf_packet net/nfc/nci/ntf.c:386 [inline] nci_ntf_packet+0x2ac8/0x39c0 net/nfc/nci/ntf.c:798 nci_rx_work+0x288/0x5d0 net/nfc/nci/core.c:1532 process_one_work kernel/workqueue.c:3267 [inline] process_scheduled_works+0xa81/0x1bd0 kernel/workqueue.c:3348 worker_thread+0xea5/0x1560 kernel/workqueue.c:3429 kthread+0x3e2/0x540 kernel/kthread.c:389 ret_from_fork+0x6d/0x90 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Uninit was created at: slab_post_alloc_hook mm/slub.c:3877 [inline] slab_alloc_node mm/slub.c:3918 [inline] kmem_cache_alloc_node+0x622/0xc90 mm/slub.c:3961 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577 __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668 alloc_skb include/linux/skbuff.h:1319 [inline] virtual_ncidev_write+0x6d/0x290 drivers/nfc/virtual_ncidev.c:120 vfs_write+0x497/0x14d0 fs/read_write.c:588 ksys_write+0x20f/0x4c0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __x64_sys_write+0x93/0xe0 fs/read_write.c:652 x64_sys_call+0x3062/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f CPU: 0 PID: 2431 Comm: kworker/u8:8 Not tainted 6.9.0-syzkaller-02707-g614da38e2f7a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Workqueue: nfc2_nci_rx_wq nci_rx_work ===================================================== --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. If the report is already addressed, let syzbot know by replying with: #syz fix: exact-commit-title If you want to overwrite report's subsystems, reply with: #syz set subsystems: new-subsystem (See the list of subsystem names on the web dashboard) If the report is a duplicate of another one, reply with: #syz dup: exact-subject-of-another-report If you want to undo deduplication, reply with: #syz undup