From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757601AbcEDKi4 (ORCPT ); Wed, 4 May 2016 06:38:56 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50067 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757188AbcEDKiz (ORCPT ); Wed, 4 May 2016 06:38:55 -0400 Date: Wed, 4 May 2016 12:38:52 +0200 From: Oleg Nesterov To: Kangjie Lu Cc: akpm@linux-foundation.org, peterz@infradead.org, amanieu@gmail.com, linux-kernel@vger.kernel.org, taesoo@gatech.edu, insu@gatech.edu, Kangjie Lu Subject: Re: [PATCH] infoleak fix1 in signal Message-ID: <20160504103851.GA6977@redhat.com> References: <1462308150-6083-1-git-send-email-kjlu@gatech.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1462308150-6083-1-git-send-email-kjlu@gatech.edu> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/03, Kangjie Lu wrote: > > The stack object “info” has a total size of 128 bytes; however, > only 28 bytes are initialized. The remaining uninitialized bytes > are sent to userland via send_signal. Not really, please see copy_siginfo_to_user(), case(__SI_CHLD). All members copied to user-space are initialized afaics. > @@ -1594,6 +1594,7 @@ bool do_notify_parent(struct task_struct *tsk, int sig) > sig = SIGCHLD; > } > > + memset(&info, 0, sizeof(info)); looks like a false alarm to me. Oleg.