Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp632932yba; Thu, 16 May 2019 06:39:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqxWRLJSV84Tycwwpti7Z3LCJ3r63SZbc2W5lwTXcjrNgfudjNwTLXD1Dnr3SeCZbOUgMd4Z X-Received: by 2002:a62:3501:: with SMTP id c1mr55120649pfa.184.1558013944808; Thu, 16 May 2019 06:39:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558013944; cv=none; d=google.com; s=arc-20160816; b=wGxOp6E65/AdkDEfaVrdgLag6kRjSnt0XtjmcrzoNidRqLcHVAXCUa0owRhXM5wVqx ezyC/Q3vXgCPNVu/6mpm/9mYcic+CzEawbsLA3akosylbPEtf8RwR7qgO3uosztp/Dcc dCVlBAOyYy03GKM4nVjt9Sz8AB+7vw0eBdaFdXtbbB9zBoCwaWum532jDP/OW57zACKp 1j90t4Gz2bvZWFeLaKHIj0kx2066yp+wI4ZP7jY3DDWNOaTd9YiJl3ecT20dRjoKJ1zE pFZj7rZLT4pRI/F8QS1rCDM78j6t+PlmvBy8PdzwKhdgmw/ZrHXdrbfXFYj1Vidhsb89 8jVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=xFpiseOvxjYREE7mvPD04hSr+CZBwNwAX+24R59wIfg=; b=UZYN5QKYAn5BsZ4EWoRZw1ufVxSuX0mYzP2tdFFOJCYc58wxu4eKV0UvIoPjlzJk4A o2YjhogYNWFlRwakuFuaLvQdqTT3c4K/72KyMPex4oMluW/9b3oeAZE8vy3FUO1P6Oe2 CD65QiRPNbD+ZYIPQrLiDYr9obID7ZVMSPPDz7coJixS6LZAFIUhgP1cRC6/oLrzvC2g uxaaJx2No9uIkdCJQ64AZg08FK5Zs7eiu4Id8PyCE7cKnETOoCmhg+qesHNc6329s0ew 0A9pv5i1CiubS12yEYOwxnSfKUrEs9TDIyiP26+yCo/Kwq1o+yJFW1k4+QQSY7vOggPO AEow== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r7si4956270ple.418.2019.05.16.06.38.49; Thu, 16 May 2019 06:39:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727198AbfEPNho (ORCPT + 99 others); Thu, 16 May 2019 09:37:44 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:59934 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726528AbfEPNho (ORCPT ); Thu, 16 May 2019 09:37:44 -0400 Received: from fsav103.sakura.ne.jp (fsav103.sakura.ne.jp [27.133.134.230]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id x4GDbRZ2038911; Thu, 16 May 2019 22:37:27 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav103.sakura.ne.jp (F-Secure/fsigk_smtp/530/fsav103.sakura.ne.jp); Thu, 16 May 2019 22:37:27 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/530/fsav103.sakura.ne.jp) Received: from [192.168.1.8] (softbank126012062002.bbtec.net [126.12.62.2]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id x4GDbR4R038908 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NO); Thu, 16 May 2019 22:37:27 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: KMSAN: uninit-value in tomoyo_check_inet_address To: Alexander Potapenko Cc: syzbot , James Morris , LKML , linux-security-module , "Serge E. Hallyn" , syzkaller-bugs , takedakn@nttdata.co.jp References: <00000000000032685a058900d170@google.com> <2b0b9d18-6773-f2dc-ecb2-9f8782d0962a@i-love.sakura.ne.jp> From: Tetsuo Handa Message-ID: Date: Thu, 16 May 2019 22:37:30 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/05/16 22:19, Alexander Potapenko wrote: >> commit e6193f78bb689f3f424559bb45f4a091c8b314df >> Author: Tetsuo Handa >> Date: Fri Apr 12 19:59:36 2019 +0900 >> >> tomoyo: Check address length before reading address family >> >> KMSAN will complain if valid address length passed to bind()/connect()/ >> sendmsg() is shorter than sizeof("struct sockaddr"->sa_family) bytes. >> >> Signed-off-by: Tetsuo Handa >> Signed-off-by: James Morris > Apparently the fix didn't make it to 5.1, I'll cherry-pick it to KMSAN tree. Together with three more patches listed bottom, please. > OOC, how did you know about this bug? I did a tree-wide check when writing a patch for KMSAN: uninit-value in rds_bind KMSAN: uninit-value in rds_connect reports. Patches for LSM part just did not make it to 5.1. commit b9ef5513c99bf9c8bfd9c9e8051b67f52b2dee1e Author: Tetsuo Handa Date: Fri Apr 12 19:59:35 2019 +0900 smack: Check address length before reading address family commit 619ae03e922b65a1a5d4269ceae1e9e13a058d6b Author: Casey Schaufler Date: Tue Apr 30 14:13:32 2019 -0700 Smack: Fix kbuild reported build error commit c750e6929d3c76d13d1d0ba475989d6dd74785d5 Author: Tetsuo Handa Date: Fri Apr 12 19:59:34 2019 +0900 selinux: Check address length before reading address family