Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp4193527rdh; Tue, 28 Nov 2023 14:48:48 -0800 (PST) X-Google-Smtp-Source: AGHT+IH3X/VdsgaO/TyYoojqwnJZyFi1+NQMt9In+cWsgDl5y/669jMkhcpCEAtlbF06vyWB/Cn7 X-Received: by 2002:a05:6870:9a0a:b0:1fa:a10:d016 with SMTP id fo10-20020a0568709a0a00b001fa0a10d016mr16558636oab.5.1701211728194; Tue, 28 Nov 2023 14:48:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701211728; cv=none; d=google.com; s=arc-20160816; b=Ybdv4uRNz+XQiIk5zO604hk+VFoj+/sq8xEZjS/RErAxvwMqiqPwdMHhd+wN3a46uO kazcwwaVfvE6dMSWdOc6HNsb3boECAbUVUEvCNlDwEjrZt7hRyFR22THnUzDbfNVzUtI PoJJV0UR9evQKhs7qYkmpWBC9GKNCFWi8rT1PAkrXjf9kY8FE1DSzwx7f8VlZtAuANwC cG9VIEpLsl6yTShNsYapS0xUPXC8N8K8O5b8t/3UHynT2f4nEGlmcs4JfsGRBo9tY5lA r5h8ihg5d2e5cPbXZNTs7gyzmO1HSzv/dIHn423y8HsOyiHJ5dfP6e+26joCIhnQ6G7/ +LvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=sqhOH7HDksvDaeNqmw8j4S6QM8peZMro746b6naa7vg=; fh=qRcYLI2h3ZbdJgkmjUlrSwOZ3KvUqXfQWkIA5YOaZv0=; b=eKq5uaGepSG8JIvY0k7cv6GyR4Lot6/0ML7wfu41mxTtmsY/w8Ypn4U8awtiMi2VN1 v11S46jQYXqHG19fL2/kZ/4JrssUT9oLQn4UCpTUxTKapEeOgDGbregxws2nuVDPgPj8 3dvhNudW2wWoA7zTgp5jyGrCCW3BrILHLnK2VSKC91C5VdDzdn1YRCw0SHJtGbfTSyTV w1dUmXOjHg+pANF7Doowc1chFlwtFY8JuG7lsDH4TGzap0SukyqylpCxBW5F3+3Xvr9v 98OcDQzOKvVtdMJKLTj8SPPGjs9mMqjCzd3Au1pHUjb+FrXVrdCaAIo/n9Trw0TlJx9k /rUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@danm.net header.s=sig1 header.b=fNukShFf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id s32-20020a056a0017a000b006cb6fb35ba2si13089179pfg.82.2023.11.28.14.48.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Nov 2023 14:48:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@danm.net header.s=sig1 header.b=fNukShFf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 0A9688069433; Tue, 28 Nov 2023 14:48:46 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229656AbjK1WsY (ORCPT + 99 others); Tue, 28 Nov 2023 17:48:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53958 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229543AbjK1WsX (ORCPT ); Tue, 28 Nov 2023 17:48:23 -0500 Received: from mr85p00im-hyfv06011401.me.com (mr85p00im-hyfv06011401.me.com [17.58.23.191]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 75F8383 for ; Tue, 28 Nov 2023 14:48:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=danm.net; s=sig1; t=1701211709; bh=sqhOH7HDksvDaeNqmw8j4S6QM8peZMro746b6naa7vg=; h=From:To:Subject:Date:Message-ID:MIME-Version; b=fNukShFfmOS+40vu5jj+975abPHCxKE2Y0UdYZ6Lhq4XF3BiHqutQX6FTiIZF9apP OsYEbW8/2WNgKuuDvDhBsQEcBlAezs0W2HiHSGFT+02bOM+IG+eIOWCGZni2qlFCUW DtX0iJ1PzKEgWwg2yY9igjN3bsB+EGWeOc079l/2pJStpRTmdl/WSzw8AWbddKM8nJ gLhABa1o87aW/bm6GtWMy7DOaWxBYfk8t/AEqtah8cq6GIjn/vOEi+MHN3LihR+PsL WJcsU8QUnnzLEHY+GSpLkE9MG9v8JwD4PIbGsbb65Ad8Ppyl/xTWy2fOq5HkBImsqT 1o50lyjrtLdfA== Received: from hitch.danm.net (mr38p00im-dlb-asmtp-mailmevip.me.com [17.57.152.18]) by mr85p00im-hyfv06011401.me.com (Postfix) with ESMTPSA id E42E8357AEC5; Tue, 28 Nov 2023 22:48:25 +0000 (UTC) From: Dan Moulding To: sam@gentoo.org Cc: dan@danm.net, linux-hardening@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org, toralf.foerster@gmx.de Subject: Re: 6.5.13 regression: BUG: kernel NULL pointer dereference, address: 0000000000000020 Date: Tue, 28 Nov 2023 15:48:16 -0700 Message-ID: <20231128224816.6563-1-dan@danm.net> X-Mailer: git-send-email 2.41.0 In-Reply-To: <87jzq1lflc.fsf@gentoo.org> References: <87jzq1lflc.fsf@gentoo.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-GUID: BzPu9jSF4Hw21U6xu4xtvi1w9T--vBIs X-Proofpoint-ORIG-GUID: BzPu9jSF4Hw21U6xu4xtvi1w9T--vBIs X-Proofpoint-Virus-Version: =?UTF-8?Q?vendor=3Dfsecure_engine=3D1.1.170-22c6f66c430a71ce266a39bfe25bc?= =?UTF-8?Q?2903e8d5c8f:6.0.138,18.0.572,17.0.605.474.0000000_definitions?= =?UTF-8?Q?=3D2020-02-14=5F11:2020-02-14=5F02,2020-02-14=5F11,2020-01-23?= =?UTF-8?Q?=5F02_signatures=3D0?= X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 phishscore=0 bulkscore=0 mlxscore=0 suspectscore=0 malwarescore=0 mlxlogscore=338 adultscore=0 clxscore=1030 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2308100000 definitions=main-2311280179 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Tue, 28 Nov 2023 14:48:46 -0800 (PST) Thanks, Sam. Yes it does look like that's the same issue. I applied that patch to v6.6.3 instead of reverting the change to the randomize_layout plugin and the problem also goes away with the patch applied. In that thread with the patch, Gustavo does mention that many other zero-length arrays, besides this one in struct neighbor, were found in the kernel source. But a quick (and possibly imperfect) grepping seems to show that struct neighbor was the only one used with __randomize_layout. So, I *think* it might be the only one that could cause a problem with the recent change to the randomize_layout plugin. -- Dan