Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp2099564pxb; Sat, 22 Jan 2022 16:14:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJyFzXJxkP6izVSxuKgDbKjP40GWB+y3afu61sT68KmDuvLv2ew9sYPIeO4NUrBRaX9EcliG X-Received: by 2002:a17:903:2448:b0:14b:1d14:8ddb with SMTP id l8-20020a170903244800b0014b1d148ddbmr8465211pls.147.1642896892447; Sat, 22 Jan 2022 16:14:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642896892; cv=none; d=google.com; s=arc-20160816; b=LDYi/fNGxdfaj/J7MnOLB/D19qVelpnpI4AcMB7ifjdK5S7tZBCAboq3NuspMU6hew RLqBNKb4jtU3W0TiiK952VfvCc5WviBMF1h7hyBqoSCaz571rmvv6bbsCe80jtuH8gIq OT3unb3f/LVLE0lN/E1B1ImfmJOsvLnvvdugdK5SZIKyRPUy7g/r5wHyLn0+9wBeKHIB dQrE7YChq3UkLB2q6Pd0ukXsLhTk7DBuuKTq1fkADL7Itikccv/9xonmzkVINuORvBpx MVrhWMKpkmGtRmbk6xkYO+WpacywfWszLVh4SyZtYowFpQs26xk6Oilk31TMqJ/VQNar WQYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=qMCnZKx9gQzkxc3/YBHHwSWQJufjQ/k1XscMSc1KBgw=; b=L1QGUIRMewPcP1ZV6+Ih0t06EangQzmutHMCrjUAL9elIoQzz0mLG/jkUIjerul6F3 LRXaL4U4R8ou41eqJ4jU1lpo8Bnfy6Yz0MkukQ7DmfjrKYTQYVv1juNi4DkW2ilC8Lpx DE+bGc1Omd7CE5rEIWeHGQKgmNwNpglb+eJHLTf5eiC1bn/F4tLmLLyTjqAkyMfW+fJm xRxCVL5wB43C/tQNI+MnT4R7shC252qUKHtVbd9L4sM+r0gWlkKGBbJkq6uubRsD2Ijo 3wdpo+Z98Gx0QYq+YIwF0KhQy4U3lb30fmja3wYxwD9gkHhWqKlftfj52VB8S6/VupFE fHRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ab0RniSx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j10si11177125pgq.831.2022.01.22.16.14.41; Sat, 22 Jan 2022 16:14:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ab0RniSx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231371AbiAVDkO (ORCPT + 99 others); Fri, 21 Jan 2022 22:40:14 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52168 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229598AbiAVDkM (ORCPT ); Fri, 21 Jan 2022 22:40:12 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 65919C06173B; Fri, 21 Jan 2022 19:40:12 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id E0E8D61B05; Sat, 22 Jan 2022 03:40:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPS id 4F06AC340E4; Sat, 22 Jan 2022 03:40:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1642822810; bh=5nPrRQxVOAj/qv9D1fN4iOkzeZZgJo5G6vEXoTa4yQw=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=ab0RniSxwvqxQZPVpBO4VKpkkZD5JQQUyCGNGdTM/3e25TjUlpmxWq3zjJ6lqfLTz zz14pnuKIjxWd39hObQBHx/bx06v+LiSiINFwBhsR5hlVE12PI8+A1kOMISwJeTtAK /P3xywjw8QgF3AvDxH1YDvu2EzCyQ3y9KAS1RGSAd5eIJJXULM6WDR3qkq0umDGTJU 5WQ1hmjaEyeVjt+RfDtohxoqd+i+BcIfK3snJ5XXkLiIe6ttZWX2zyw5u0brVfezZ7 kf2H2ruio5cKPB5A64bzIz6XZrND+V73+NG+8BqllnZyV0A7lEFCyQfGotC8MLoaxF cpLmqJp29Iixw== Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id 32D1CF60796; Sat, 22 Jan 2022 03:40:10 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH] mptcp: Use struct_group() to avoid cross-field memset() From: patchwork-bot+netdevbpf@kernel.org Message-Id: <164282281020.32276.3955066233217706965.git-patchwork-notify@kernel.org> Date: Sat, 22 Jan 2022 03:40:10 +0000 References: <20220121073935.1154263-1-keescook@chromium.org> In-Reply-To: <20220121073935.1154263-1-keescook@chromium.org> To: Kees Cook Cc: mathew.j.martineau@linux.intel.com, matthieu.baerts@tessares.net, davem@davemloft.net, kuba@kernel.org, netdev@vger.kernel.org, mptcp@lists.linux.dev, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to netdev/net.git (master) by Jakub Kicinski : On Thu, 20 Jan 2022 23:39:35 -0800 you wrote: > In preparation for FORTIFY_SOURCE performing compile-time and run-time > field bounds checking for memcpy(), memmove(), and memset(), avoid > intentionally writing across neighboring fields. > > Use struct_group() to capture the fields to be reset, so that memset() > can be appropriately bounds-checked by the compiler. > > [...] Here is the summary with links: - mptcp: Use struct_group() to avoid cross-field memset() https://git.kernel.org/netdev/net/c/63ec72bd5848 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html