[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20241002053844.130553-1-danielyangkang@gmail.com>
Date: Tue, 1 Oct 2024 22:38:42 -0700
From: Daniel Yang <danielyangkang@...il.com>
To: "David S. Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>,
Jakub Kicinski <kuba@...nel.org>,
Paolo Abeni <pabeni@...hat.com>,
"GitAuthor: Daniel Yang" <danielyangkang@...il.com>,
netdev@...r.kernel.org,
linux-kernel@...r.kernel.org
Cc: syzbot+346474e3bf0b26bd3090@...kaller.appspotmail.com
Subject: [PATCH] Fix KMSAN infoleak, initialize unused data in pskb_expand_head
pskb_expand_head doesn't initialize extra nhead bytes in header and
tail bytes, leading to KMSAN infoleak error. Fix by initializing data to
0 with memset.
Reported-by: syzbot+346474e3bf0b26bd3090@...kaller.appspotmail.com
Tested-by: Daniel Yang <danielyangkang@...il.com>
Signed-off-by: Daniel Yang <danielyangkang@...il.com>
---
net/core/skbuff.c | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/net/core/skbuff.c b/net/core/skbuff.c
index 74149dc4e..348161dcb 100644
--- a/net/core/skbuff.c
+++ b/net/core/skbuff.c
@@ -2286,6 +2286,11 @@ int pskb_expand_head(struct sk_buff *skb, int nhead, int ntail,
skb_shinfo(skb),
offsetof(struct skb_shared_info, frags[skb_shinfo(skb)->nr_frags]));
+ /* Initialize newly allocated headroom and tailroom
+ */
+ memset(data, 0, nhead);
+ memset(data + nhead + skb->tail, 0, skb_tailroom(skb) + ntail);
+
/*
* if shinfo is shared we must drop the old head gracefully, but if it
* is not we can just drop the old head and let the existing refcount
--
2.39.2
Powered by blists - more mailing lists