lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <163057980548.19226.5521481584542089933.git-patchwork-notify@kernel.org>
Date:   Thu, 02 Sep 2021 10:50:05 +0000
From:   patchwork-bot+netdevbpf@...nel.org
To:     Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
Cc:     davem@...emloft.net, kuba@...nel.org, nathan@...nel.org,
        ndesaulniers@...gle.com, netdev@...r.kernel.org,
        clang-built-linux@...glegroups.com, hdanton@...a.com
Subject: Re: [PATCH] flow: fix object-size-mismatch warning in
 flowi{4,6}_to_flowi_common()

Hello:

This patch was applied to netdev/net.git (refs/heads/master):

On Thu, 2 Sep 2021 14:36:17 +0900 you wrote:
> Commit 3df98d79215ace13 ("lsm,selinux: pass flowi_common instead of flowi
> to the LSM hooks") introduced flowi{4,6}_to_flowi_common() functions which
> cause UBSAN warning when building with LLVM 11.0.1 on Ubuntu 21.04.
> 
>  ================================================================================
>  UBSAN: object-size-mismatch in ./include/net/flow.h:197:33
>  member access within address ffffc9000109fbd8 with insufficient space
>  for an object of type 'struct flowi'
>  CPU: 2 PID: 7410 Comm: systemd-resolve Not tainted 5.14.0 #51
>  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
>  Call Trace:
>   dump_stack_lvl+0x103/0x171
>   ubsan_type_mismatch_common+0x1de/0x390
>   __ubsan_handle_type_mismatch_v1+0x41/0x50
>   udp_sendmsg+0xda2/0x1300
>   ? ip_skb_dst_mtu+0x1f0/0x1f0
>   ? sock_rps_record_flow+0xe/0x200
>   ? inet_send_prepare+0x2d/0x90
>   sock_sendmsg+0x49/0x80
>   ____sys_sendmsg+0x269/0x370
>   __sys_sendmsg+0x15e/0x1d0
>   ? syscall_enter_from_user_mode+0xf0/0x1b0
>   do_syscall_64+0x3d/0xb0
>   entry_SYSCALL_64_after_hwframe+0x44/0xae
>  RIP: 0033:0x7f7081a50497
>  Code: 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
>  RSP: 002b:00007ffc153870f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
>  RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f7081a50497
>  RDX: 0000000000000000 RSI: 00007ffc15387140 RDI: 000000000000000c
>  RBP: 00007ffc15387140 R08: 0000563f29a5e4fc R09: 000000000000cd28
>  R10: 0000563f29a68a30 R11: 0000000000000246 R12: 000000000000000c
>  R13: 0000000000000001 R14: 0000563f29a68a30 R15: 0000563f29a5e50c
>  ================================================================================
> 
> [...]

Here is the summary with links:
  - flow: fix object-size-mismatch warning in flowi{4,6}_to_flowi_common()
    https://git.kernel.org/netdev/net/c/b9edbfe1adec

You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ