[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGiJo8TaC70QNAtFCziRUAzN1hH9zjnMAuMMToAts0yFcRqPWw@mail.gmail.com>
Date: Wed, 2 Oct 2024 21:42:08 -0700
From: Daniel Yang <danielyangkang@...il.com>
To: Daniel Borkmann <daniel@...earbox.net>
Cc: Eric Dumazet <edumazet@...gle.com>, "David S. Miller" <davem@...emloft.net>,
Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, netdev@...r.kernel.org,
linux-kernel@...r.kernel.org,
syzbot+346474e3bf0b26bd3090@...kaller.appspotmail.com
Subject: Re: [PATCH] Fix KMSAN infoleak, initialize unused data in pskb_expand_head
I took a look at https://www.spinics.net/lists/netdev/msg982652.html
and am a little confused since the patch adds a check instead of
initializing the memory segment.
Is the general assumption that any packet with uninitialized memory is
ill formed and we need to drop? Also is there any documentation for
internal macros/function calls for BPF because I was trying to look
and couldn't find any.
Powered by blists - more mailing lists