From: Horatiu Vultur <horatiu.vultur@microchip.com>
To: Simon Horman <horms@kernel.org>
Cc: Julian Anastasov <ja@ssi.bg>,
Pablo Neira Ayuso <pablo@netfilter.org>,
Jozsef Kadlecsik <kadlec@netfilter.org>,
Florian Westphal <fw@strlen.de>, <netdev@vger.kernel.org>,
"David S. Miller" <davem@davemloft.net>,
David Ahern <dsahern@kernel.org>,
Eric Dumazet <edumazet@google.com>,
Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>,
<lvs-devel@vger.kernel.org>, <linux-kernel@vger.kernel.org>,
<netfilter-devel@vger.kernel.org>, <coreteam@netfilter.org>
Subject: Re: [PATCH nf-next v2 1/4] ipvs: Update width of source for ip_vs_sync_conn_options
Date: Tue, 11 Apr 2023 13:39:24 +0200 [thread overview]
Message-ID: <20230411113924.6vhibpekifbyjksg@soft-dev3-1> (raw)
In-Reply-To: <20230409-ipvs-cleanup-v2-1-204cd17da708@kernel.org>
The 04/11/2023 09:10, Simon Horman wrote:
>
> In ip_vs_sync_conn_v0() copy is made to struct ip_vs_sync_conn_options.
> That structure looks like this:
>
> struct ip_vs_sync_conn_options {
> struct ip_vs_seq in_seq;
> struct ip_vs_seq out_seq;
> };
>
> The source of the copy is the in_seq field of struct ip_vs_conn. Whose
> type is struct ip_vs_seq. Thus we can see that the source - is not as
> wide as the amount of data copied, which is the width of struct
> ip_vs_sync_conn_option.
>
> The copy is safe because the next field in is another struct ip_vs_seq.
> Make use of struct_group() to annotate this.
>
> Flagged by gcc-13 as:
>
> In file included from ./include/linux/string.h:254,
> from ./include/linux/bitmap.h:11,
> from ./include/linux/cpumask.h:12,
> from ./arch/x86/include/asm/paravirt.h:17,
> from ./arch/x86/include/asm/cpuid.h:62,
> from ./arch/x86/include/asm/processor.h:19,
> from ./arch/x86/include/asm/timex.h:5,
> from ./include/linux/timex.h:67,
> from ./include/linux/time32.h:13,
> from ./include/linux/time.h:60,
> from ./include/linux/stat.h:19,
> from ./include/linux/module.h:13,
> from net/netfilter/ipvs/ip_vs_sync.c:38:
> In function 'fortify_memcpy_chk',
> inlined from 'ip_vs_sync_conn_v0' at net/netfilter/ipvs/ip_vs_sync.c:606:3:
> ./include/linux/fortify-string.h:529:25: error: call to '__read_overflow2_field' declared with attribute warning: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Werror=attribute-warning]
> 529 | __read_overflow2_field(q_size_field, size);
> |
>
> Compile tested only.
Reviewed-by: Horatiu Vultur <horatiu.vultur@microchip.com>
>
> Signed-off-by: Simon Horman <horms@kernel.org>
> ---
> v2
> * Correct spelling of 'conn' in subject
> ---
> include/net/ip_vs.h | 6 ++++--
> net/netfilter/ipvs/ip_vs_sync.c | 2 +-
> 2 files changed, 5 insertions(+), 3 deletions(-)
>
> diff --git a/include/net/ip_vs.h b/include/net/ip_vs.h
> index 6d71a5ff52df..e20f1f92066d 100644
> --- a/include/net/ip_vs.h
> +++ b/include/net/ip_vs.h
> @@ -630,8 +630,10 @@ struct ip_vs_conn {
> */
> struct ip_vs_app *app; /* bound ip_vs_app object */
> void *app_data; /* Application private data */
> - struct ip_vs_seq in_seq; /* incoming seq. struct */
> - struct ip_vs_seq out_seq; /* outgoing seq. struct */
> + struct_group(sync_conn_opt,
> + struct ip_vs_seq in_seq; /* incoming seq. struct */
> + struct ip_vs_seq out_seq; /* outgoing seq. struct */
> + );
>
> const struct ip_vs_pe *pe;
> char *pe_data;
> diff --git a/net/netfilter/ipvs/ip_vs_sync.c b/net/netfilter/ipvs/ip_vs_sync.c
> index 4963fec815da..d4fe7bb4f853 100644
> --- a/net/netfilter/ipvs/ip_vs_sync.c
> +++ b/net/netfilter/ipvs/ip_vs_sync.c
> @@ -603,7 +603,7 @@ static void ip_vs_sync_conn_v0(struct netns_ipvs *ipvs, struct ip_vs_conn *cp,
> if (cp->flags & IP_VS_CONN_F_SEQ_MASK) {
> struct ip_vs_sync_conn_options *opt =
> (struct ip_vs_sync_conn_options *)&s[1];
> - memcpy(opt, &cp->in_seq, sizeof(*opt));
> + memcpy(opt, &cp->sync_conn_opt, sizeof(*opt));
> }
>
> m->nr_conns++;
>
> --
> 2.30.2
>
--
/Horatiu
next prev parent reply other threads:[~2023-04-11 11:39 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-04-11 7:10 [PATCH nf-next v2 0/4] ipvs: Cleanups for v6.4 Simon Horman
2023-04-11 7:10 ` [PATCH nf-next v2 1/4] ipvs: Update width of source for ip_vs_sync_conn_options Simon Horman
2023-04-11 11:39 ` Horatiu Vultur [this message]
2023-04-11 7:10 ` [PATCH nf-next v2 2/4] ipvs: Consistently use array_size() in ip_vs_conn_init() Simon Horman
2023-04-11 11:34 ` Horatiu Vultur
2023-04-11 7:10 ` [PATCH nf-next v2 3/4] ipvs: Remove {Enter,Leave}Function Simon Horman
2023-04-11 11:31 ` Horatiu Vultur
2023-04-11 7:10 ` [PATCH nf-next v2 4/4] ipvs: Correct spelling in comments Simon Horman
2023-04-11 11:33 ` Horatiu Vultur
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230411113924.6vhibpekifbyjksg@soft-dev3-1 \
--to=horatiu.vultur@microchip.com \
--cc=coreteam@netfilter.org \
--cc=davem@davemloft.net \
--cc=dsahern@kernel.org \
--cc=edumazet@google.com \
--cc=fw@strlen.de \
--cc=horms@kernel.org \
--cc=ja@ssi.bg \
--cc=kadlec@netfilter.org \
--cc=kuba@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=lvs-devel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=pablo@netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox