Re: [PATCH net] netlink: Fix nlmsg_parse as a wrapper for strict message parsing

2019-08-13 Thread Jakub Kicinski
On Mon, 12 Aug 2019 13:07:07 -0700, David Ahern wrote: > From: David Ahern > > Eric reported a syzbot warning: > > BUG: KMSAN: uninit-value in nh_valid_get_del_req+0x6f1/0x8c0 > net/ipv4/nexthop.c:1510 > CPU: 0 PID: 11812 Comm: syz-executor444 Not tainted 5.3.0-rc3+ #17 > Hardware name: Google

Re: [PATCH net] netlink: Fix nlmsg_parse as a wrapper for strict message parsing

2019-08-13 Thread Eric Dumazet
On 8/12/19 10:07 PM, David Ahern wrote: > From: David Ahern > > Eric reported a syzbot warning: > > > The root cause is nlmsg_parse calling __nla_parse which means the > header struct size is not checked. > > nlmsg_parse should be a wrapper around __nlmsg_parse with > NL_VALIDATE_STRICT for

[PATCH net] netlink: Fix nlmsg_parse as a wrapper for strict message parsing

2019-08-12 Thread David Ahern
From: David Ahern Eric reported a syzbot warning: BUG: KMSAN: uninit-value in nh_valid_get_del_req+0x6f1/0x8c0 net/ipv4/nexthop.c:1510 CPU: 0 PID: 11812 Comm: syz-executor444 Not tainted 5.3.0-rc3+ #17 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Ca