From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrew Morton Date: Mon, 22 Nov 2010 23:50:43 +0000 Subject: Re: [PATCH v2] fs: select: fix information leak to userspace Message-Id: <20101122155043.fbbb74f4.akpm@linux-foundation.org> List-Id: References: <1289421483-23907-1-git-send-email-segooon@gmail.com> <20101112120834.33062900.akpm@linux-foundation.org> <8D90F8B2-EA29-4EB9-9807-294CE0D5523B@dilger.ca> <20101114092533.GB5323@albatros> <20101114180643.593d19ac.akpm@linux-foundation.org> <1289848341.2607.125.camel@edumazet-laptop> <4CE268C8.5010203@panasas.com> In-Reply-To: <4CE268C8.5010203@panasas.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: Boaz Harrosh Cc: Eric Dumazet , Vasiliy Kulikov , Andreas Dilger , kernel-janitors@vger.kernel.org, Alexander Viro , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Jakub Jelinek On Tue, 16 Nov 2010 13:19:36 +0200 Boaz Harrosh wrote: > On 11/15/2010 09:12 PM, Eric Dumazet wrote: > > Le dimanche 14 novembre 2010 __ 18:06 -0800, Andrew Morton a __crit : > >> On Sun, 14 Nov 2010 12:25:33 +0300 Vasiliy Kulikov wrote: > >>> > >>> if (timeval) { > >>> - rtv.tv_sec = rts.tv_sec; > >>> - rtv.tv_usec = rts.tv_nsec / NSEC_PER_USEC; > >>> + struct timeval rtv = { > >>> + .tv_sec = rts.tv_sec, > >>> + .tv_usec = rts.tv_nsec / NSEC_PER_USEC > >>> + }; > >>> > >>> if (!copy_to_user(p, &rtv, sizeof(rtv))) > >>> return ret; > >> > >> Please check the assembly code - this will still leave four bytes of > >> uninitalised stack data in 'rtv', surely. > > > > Thats a good question. > > > > In my understanding, gcc should initialize all holes (and other not > > mentioned fields) with 0, even for automatic storage [C99 only mandates > > this on static storage] > > > > I tested on x86_64 and this is the case, but could not find a definitive > > answer in gcc documentation. > > > > This kind of construct is widely used in networking tree. > > > > Maybe we should ask to gcc experts if this behavior is guaranteed by > > gcc, or if we must review our code ;( > > > > CC Jakub > > > > Thanks ! > > > > This is what I thought too. If it is not there are tones of bugs I wrote > of code that relays on this behaviour. > > It would be interesting to know for sure Well. We certainly assume in many places that struct foo { int a; int b; } f = { .a = 1, }; will initialise b to zero. But I doubt if much code at all assumes that this initialisation patterm will reliably zero out *holes* in the struct.