[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200729125820.GB1840@kadam>
Date: Wed, 29 Jul 2020 15:58:20 +0300
From: Dan Carpenter <dan.carpenter@...cle.com>
To: Peilin Ye <yepeilin.cs@...il.com>
Cc: Denis Efremov <efremov@...ux.com>, Jens Axboe <axboe@...nel.dk>,
Arnd Bergmann <arnd@...db.de>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
linux-kernel-mentees@...ts.linuxfoundation.org,
linux-block@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [Linux-kernel-mentees] [PATCH v2] block/floppy: Prevent
kernel-infoleak in raw_cmd_copyout()
Argh... This isn't right still. The "ptr" comes from raw_cmd_copyin()
ptr = kmalloc(sizeof(struct floppy_raw_cmd), GFP_KERNEL);
The struct hole could still be uninitialized from kmalloc() and instead
of from the stack. Smatch is only looking for the common stack info
leaks and doesn't worn about holes in kmalloc()ed memory.
regards,
dan carpenter
Powered by blists - more mailing lists