Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp651777pxb; Fri, 16 Apr 2021 14:53:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzICkokSfUDUy3gLceVsgz1UGRb10moDxFpYEUnhzL7V0+5fLYM3HnV8M/bfMxguI0I0c5Q X-Received: by 2002:aa7:dc15:: with SMTP id b21mr12468143edu.350.1618610003303; Fri, 16 Apr 2021 14:53:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618610003; cv=none; d=google.com; s=arc-20160816; b=thxmDV+uMOlvnO/ZtbT0871S32wUj+2del0q+oOJ7xlHjd1w8+b6592twr3v3qCH+t hPyikGCTn5gA+fX76SnAlgKl4K9KS07Ksd/4tlPdEAgX3QrTyT5MeP3dAKVQt5emux8O bjNX9Fa2hUsD+4FjlqovAmB32+q1wJTGIhXSOHLmBs1vqbhPpwPCUTVy5Tj6q5rbsY8o mnNkUTt9pm5Y1KiZBi5hw9lyNwNwlxEIfxfbnTOPcBbuIiK9OiNIFjWTlvftBBDxuCrI AaV/7N4+YWK8N+j6dmL5tQCqs8V7d2aXNfBLoXVnP/wakE8pySB7kwspPTWTM9nKv2vp ABpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=370XDRLr4HUPrNeyFVAIkihhs+fZTLIjSqnqH+bzXr0=; b=oM2F5h7+xQytmKc7li0mPZTQzh62zyS7/mxfqocf2bX0DafqFYq0mbGNUKqMp6/4SV fciLQaFbm4uAMn+0IqIBfT7XdWg2AcvR8v9FzymomlFRn8mTfAbBlvVoSzADabz2MOuK wbYCKqTme56qYR+AtbgnlPq5r/DeVCgNqgLTCyrNd/dP+o4EK6Lsrfx/UMJrMHRmE+cX g8O8QWxW0KW7Y9RX/jnIsGktKEz2mFNZm3Uiu8LTPkEnU2dVAT3NNEPlw7Rwj2jnnfVi xhTW5R0/dFIKIxccJKYROdgIHQ5exHwfKSU/RAp+IHn5tKefbLmIi1wBzQWwDMZr/yIC anUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=psiL2cih; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h6si5825073ejq.642.2021.04.16.14.53.00; Fri, 16 Apr 2021 14:53:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=psiL2cih; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242569AbhDPTM4 (ORCPT + 99 others); Fri, 16 Apr 2021 15:12:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:57526 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235122AbhDPTMu (ORCPT ); Fri, 16 Apr 2021 15:12:50 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id ABDD9611AF; Fri, 16 Apr 2021 19:12:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1618600344; bh=Rv2GvndnTmtUHMieNY3HvaWYmPwe9OWiXSUMXa7ltaY=; h=Date:From:To:Cc:Subject:From; b=psiL2cihVJWqJ4zI5xobZjykYKFmtbnwtlrYmaHfG8/g4dldrS/LkmyLKKU2dfQGM 6KoAD9m8etWHXBpXX1LPFVxX5lVGCtrovBRqt9UhYbyRydVvoKrxjtQvmm0NoYY+wm I5O/E/2k7mZN258GuHAmNBpmWUTOh/kQhzfqoJmfOP8IShhGB1hDBcaWJka3aVyAox +ChlnOQVPN5cjCMhxPKfJ43y2xY4pqaf1a58pHlgKGTM7c8cyyZC+35PxCUzNozLoA iv9BppMsqbKmvtgZBqbQZmB618iwMIWgBvLCFCNcVf8ElsonHwYwxt9un33zmmHNs9 b2jR1Gf+2yP7A== Date: Fri, 16 Apr 2021 14:12:36 -0500 From: "Gustavo A. R. Silva" To: Vlad Yasevich , Neil Horman , Marcelo Ricardo Leitner , "David S. Miller" , Jakub Kicinski Cc: linux-sctp@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , linux-hardening@vger.kernel.org Subject: [PATCH][next] sctp: Fix out-of-bounds warning in sctp_process_asconf_param() Message-ID: <20210416191236.GA589296@embeddedor> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix the following out-of-bounds warning: net/sctp/sm_make_chunk.c:3150:4: warning: 'memcpy' offset [17, 28] from the object at 'addr' is out of the bounds of referenced subobject 'v4' with type 'struct sockaddr_in' at offset 0 [-Warray-bounds] This helps with the ongoing efforts to globally enable -Warray-bounds and get us closer to being able to tighten the FORTIFY_SOURCE routines on memcpy(). Link: https://github.com/KSPP/linux/issues/109 Reported-by: kernel test robot Signed-off-by: Gustavo A. R. Silva --- net/sctp/sm_make_chunk.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/sctp/sm_make_chunk.c b/net/sctp/sm_make_chunk.c index 54e6a708d06e..5f9a7c028274 100644 --- a/net/sctp/sm_make_chunk.c +++ b/net/sctp/sm_make_chunk.c @@ -3147,7 +3147,7 @@ static __be16 sctp_process_asconf_param(struct sctp_association *asoc, * primary. */ if (af->is_any(&addr)) - memcpy(&addr.v4, sctp_source(asconf), sizeof(addr)); + memcpy(&addr, sctp_source(asconf), sizeof(addr)); if (security_sctp_bind_connect(asoc->ep->base.sk, SCTP_PARAM_SET_PRIMARY, -- 2.27.0