[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230815205917.1504837-1-andrew.kanner@gmail.com>
Date: Tue, 15 Aug 2023 22:59:16 +0200
From: Andrew Kanner <andrew.kanner@...il.com>
To: paul@...l-moore.com, stephen.smalley.work@...il.com,
eparis@...isplace.org
Cc: selinux@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-kernel-mentees@...ts.linuxfoundation.org,
Andrew Kanner <andrew.kanner@...il.com>
Subject: [PATCH 0/1] netlabel: KMSAN warning
Recently I started to use KMSAN and found the warning in
security/selinux/hooks.c which triggers each time I use the official
guide to run syzkaller reproducers
Link: https://github.com/google/syzkaller/blob/master/docs/syzbot_assets.md#run-a-c-reproducer
I'm not quiet confident what are the rules in security subsystem. It's
not a bug, but a warning which is triggered by KMSAN for the argument
of the security_net_peersid_resolve() which was not initialized. It
will not affect anything inside this function, at least with the
current order of checking the variables, which might eventually
change.
Please reply if you're ok with such not-a-bug fixes. Otherwise I'll
just ignore this warning in my experiments with KMSAN.
PS: most likely if fixes commit 220deb966ea5 ("SELinux: Better
integration between peer labeling subsystems"). Not sure if this tag
is needed for this patch.
Andrew Kanner (1):
selinux: netlabel: Prevent KMSAN warning in
selinux_inet_conn_request()
security/selinux/netlabel.c | 1 +
1 file changed, 1 insertion(+)
--
2.39.3
Powered by blists - more mailing lists