Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4800093yba; Tue, 30 Apr 2019 04:42:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqyBoJfjEa03jKuTKpQb6F2PEWDB2BJtyZ8xLMBTMoLrtR7lryyvQKJPcF9gOzjnlFBKkDyF X-Received: by 2002:a17:902:20cb:: with SMTP id v11mr68782913plg.324.1556624556829; Tue, 30 Apr 2019 04:42:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556624556; cv=none; d=google.com; s=arc-20160816; b=fw1WR7rl/DJIe9MExkv0vkc/g1aO3IPG1ah7A8K0htP/Kk6uQejjkaOppXa0GcXaV0 AQBQV0Jdu30XI574ebZPeeHqyEJcmTfAerG0jhiSNWKCPO1aEExCP2owZ6P9rjdwJgLO njGRDoLjT+IybQozfCvfsJtHfKiLgbeLZsBwZjsy3GKKbnDnIwWf5URWI991+EqtgCAu fhViA4jVHk6wyHlL0R5rqSSjJj47PztS7vHEkJQPontBAg4BxS7zS4lfaDtmYRReXNF3 VcUpO4IOnNg5Z0mAqA2SBzDdZvDdPEaGXT1mRTzkgkanuN9tUkORUKQUR9zbDPdHcK3X I4DA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=N0NRTTRF6T0YwN6aSxccWvVuLsf57+Nx40UqB+gqWws=; b=I31xXkDfo6pSgTst0joUER2rTTgNHfTXZQIOhW1hkZRSGwCsQrqtdBk/IeFv2HQmTj vebeQ6ScgoOllczmyGj6IYmg9qSOiikNjV5D1p++2MNIYYS82rnlP43SHAnw2hNPBfbw KO0FIggQ9oZySQwB3tolM0YCUHzUeu1lhl6OwYq1HgFbTnZ3Z0QhiEUdt8Sc34MNh+BS G2L37lxA+GLyfWYlw3HQiIHE2Ucvfq6+hpx4452aLIL8rSE+V5C12XTPcYLB9WFi9Wur Biwnbd2zxeAKF0zxEyAQdhf7SS8MLd/W8MxDcfNEeChogXeAeziNg5FMAW1OzinYUzd5 spVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ye8oVULt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i195si35624234pgd.521.2019.04.30.04.42.21; Tue, 30 Apr 2019 04:42:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ye8oVULt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728670AbfD3Lk5 (ORCPT + 99 others); Tue, 30 Apr 2019 07:40:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:47850 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727729AbfD3Lkz (ORCPT ); Tue, 30 Apr 2019 07:40:55 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D77C821670; Tue, 30 Apr 2019 11:40:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556624455; bh=fWm8gL6jcVRsAtWMyM7LzS/5pdWEsFgaL8qSw+9s7mo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ye8oVULt0Bjmcuky9G/e7sV/8KoWiPfXdk7H6k3p+uOPZxZHZFdK59F19OvlYUgLd 59txAWKpcr1VFFhSqFemwFg0bZASW10uaVUI87qPinCgmcphl6nDh02IfiPbhT8v5c petAg7f0PI4hRXekEAFiX9g+vFD/X0scpGQPFzAs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+659574e7bcc7f7eb4df7@syzkaller.appspotmail.com, Florian Westphal , Pablo Neira Ayuso Subject: [PATCH 4.9 25/41] netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON Date: Tue, 30 Apr 2019 13:38:36 +0200 Message-Id: <20190430113530.891306791@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190430113524.451237916@linuxfoundation.org> References: <20190430113524.451237916@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Florian Westphal commit 7caa56f006e9d712b44f27b32520c66420d5cbc6 upstream. It means userspace gave us a ruleset where there is some other data after the ebtables target but before the beginning of the next rule. Fixes: 81e675c227ec ("netfilter: ebtables: add CONFIG_COMPAT support") Reported-by: syzbot+659574e7bcc7f7eb4df7@syzkaller.appspotmail.com Signed-off-by: Florian Westphal Signed-off-by: Pablo Neira Ayuso Signed-off-by: Greg Kroah-Hartman --- net/bridge/netfilter/ebtables.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/bridge/netfilter/ebtables.c +++ b/net/bridge/netfilter/ebtables.c @@ -2056,7 +2056,8 @@ static int ebt_size_mwt(struct compat_eb if (match_kern) match_kern->match_size = ret; - if (WARN_ON(type == EBT_COMPAT_TARGET && size_left)) + /* rule should have no remaining data after target */ + if (type == EBT_COMPAT_TARGET && size_left) return -EINVAL; match32 = (struct compat_ebt_entry_mwt *) buf;