Received: by 2002:a05:7412:798b:b0:fc:a2b0:25d7 with SMTP id fb11csp727395rdb; Thu, 22 Feb 2024 19:10:40 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXvHuWEhBTgs3+OBlTlDIfluFrNCsU7tVjYQSjIcYCLjtqFEzKurjdjINBNdxJfxQI9A+rEmaIomQv5JtK6WVL+NlmyXt4KwVWHsIMMrg== X-Google-Smtp-Source: AGHT+IEwkLGGbtVtezrohEkb2l6xYpPq++QqjrW4RPh1snx6mCAEpaYF7QtPxc3A7RvBZMHINcpQ X-Received: by 2002:a05:6a21:1014:b0:1a0:e157:9c9d with SMTP id nk20-20020a056a21101400b001a0e1579c9dmr412046pzb.51.1708657840644; Thu, 22 Feb 2024 19:10:40 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708657840; cv=pass; d=google.com; s=arc-20160816; b=FsQX2BcivrXGg8EQDeDUOiUC/2temMpYihiwXx4UFsEULCu9XOeb9j/+GLv2gBlgPU SaMaxHbuMXpLAjWmI+NPKps+ArA73p4PfP3kjX7nywkM3fpV3LuMAWb15WZilSMzdVwe UFwJVlWSc73wIjNf6x2JVA91vBbjFIhwvvK66eGjLCcNMglqy6Px6xHYkYuwujRGXPJR em5INlj/3S5pobmg+zB0CyW8OcAnDUY5S2gYjbvJXyFEIsiliBbZslgCL1GH1vqbriam VCeCeMnddpZldSliGWTO4n6emTByH/i9Rlm7Rav0RTTlFfzSuUi00E0RYA7TpJFiU90c ox+w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:in-reply-to:references:date:message-id:from:subject :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=y87euVi9RePdR2rcbntI7xtwrB0yHR5VyJ4gmek9wFk=; fh=BvI5YQe1rTnuRNV9dpOjdAH9J669WoaIMnQHetWLN4M=; b=RWpHLVEhkSUxcPiR22RQB0TmAbJMIN5ctC9amwdaKmD4+IicS+PzJz95PaEN6viCwM sl3cKLlN0Bik2GA9r2ofQ+AjvlkcPHvNr4an/yssW4RU4U+R8E9yM0pzAai4DKDx1IrM bdi0B8mmJ1jcAi7qIcWvphObdN0rtYbH53enSxbjyuhCw6AwyKhKEwN/qtPipYUHlpmR qSavrj/C2ce5fMrTWRYWvigFtnk0HmUfPO3t5AwcnxltOjahLrYNiN9jRCbVmsXX8hyy m6MfLGDqLZBh510Qubdb057Pc+oTCUJlER51Hb3tTS6Q/x9NkiZbGGj2aZ6RWRsCP08P b+9A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bIcewTEm; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-77700-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-77700-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id np15-20020a17090b4c4f00b00299d1159bfesi367866pjb.185.2024.02.22.19.10.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 22 Feb 2024 19:10:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-77700-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bIcewTEm; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-77700-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-77700-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 0AD28285E09 for ; Fri, 23 Feb 2024 03:10:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 74F4DDDAA; Fri, 23 Feb 2024 03:10:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="bIcewTEm" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 97E5BC2C6; Fri, 23 Feb 2024 03:10:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708657826; cv=none; b=EXZzjSzG4CPu7qcmepvNATDsSUR6sdL/Ofq+iUCsD5KDfMOwyxB1XtM+RmKCtIy5PrGMGfAJZ2lwsTLz5EQTNVFC3Q9fSl+f9Rb6RZ03tY2ReXfcuKnK4fMpnd00GwH4SoLWF5UUGicr/FL5adARcyv9L9YRxvuOL7P/IwKhk+0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708657826; c=relaxed/simple; bh=ShyPs+sk9cjghhKS+XmCdRWwHN7rYc+/GlEjmNvnqUM=; h=Content-Type:MIME-Version:Subject:From:Message-Id:Date:References: In-Reply-To:To:Cc; b=o9YjxDmmTeFMgFo1+bd5MHMws21gYHAZg6R9N91sgJauurJidMXqF+4YjANBjL0od+yipJHXvgVD0Ln4yTyrI6aI5cFd/tQjz135XjmNmK0FIywp4yJA4p1OsAVxGFZPO56mUtWYj317s0R/gO6o6zIYumcbNf04E7Pit9wApq8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=bIcewTEm; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPS id 66A49C43390; Fri, 23 Feb 2024 03:10:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1708657826; bh=ShyPs+sk9cjghhKS+XmCdRWwHN7rYc+/GlEjmNvnqUM=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=bIcewTEme+9ObupVYZoPyDLHY731JB2tvS1z2pUHm+T3TRz7pwNIaHbkZMgGGLPIl W1FwjhhuQMl1k8QTADCEHb/EY1UyNxl9X8mWj26mcZ4jLLXdyiFY8Z3t4jmBk8otv0 EUmldRYB1qcff7S1YscfCGBqrr7xIXMGdrC9cdhNBBpWt49fWeir/IsftVJWHoAqpt 4OphOD/O4RXE955nF+hr2LpkXZEf3uXS1vo9cOehQIt5BbyOeO0fY8B3bfNCvq7kv2 Dq8hQF1NsPlYJX+TQM5k6IxThjYMsHyY2l1QF5oQqvfcjBhlQfDatAy9sU22XyTg9V W7Bnj8qqUbCOw== Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id 4D0C2D84BB8; Fri, 23 Feb 2024 03:10:26 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH net] netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter From: patchwork-bot+netdevbpf@kernel.org Message-Id: <170865782631.16544.1371911549002746191.git-patchwork-notify@kernel.org> Date: Fri, 23 Feb 2024 03:10:26 +0000 References: <20240221074053.1794118-1-ryasuoka@redhat.com> In-Reply-To: <20240221074053.1794118-1-ryasuoka@redhat.com> To: Ryosuke Yasuoka Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, horms@kernel.org, anjali.k.kulkarni@oracle.com, lirongqing@baidu.com, dhowells@redhat.com, pctammela@mojatatu.com, kuniyu@amazon.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, syzbot+34ad5fab48f7bf510349@syzkaller.appspotmail.com Hello: This patch was applied to netdev/net.git (main) by Jakub Kicinski : On Wed, 21 Feb 2024 16:40:48 +0900 you wrote: > syzbot reported the following uninit-value access issue [1]: > > netlink_to_full_skb() creates a new `skb` and puts the `skb->data` > passed as a 1st arg of netlink_to_full_skb() onto new `skb`. The data > size is specified as `len` and passed to skb_put_data(). This `len` > is based on `skb->end` that is not data offset but buffer offset. The > `skb->end` contains data and tailroom. Since the tailroom is not > initialized when the new `skb` created, KMSAN detects uninitialized > memory area when copying the data. > > [...] Here is the summary with links: - [net] netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter https://git.kernel.org/netdev/net/c/661779e1fcaf You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html