All of lore.kernel.org
 help / color / mirror / Atom feed
* KASAN poisoning for skb linear data
@ 2018-01-15 14:15 Dmitry Vyukov
  2018-03-08  9:20 ` Dmitry Vyukov
  2018-03-08 15:45 ` Stephen Hemminger
  0 siblings, 2 replies; 6+ messages in thread
From: Dmitry Vyukov @ 2018-01-15 14:15 UTC (permalink / raw)
  To: David Miller, Willem de Bruijn, Eric Dumazet, netdev, LKML,
	kasan-dev, Cong Wang, andreyknvl

Hi,

As far as I understand pskb_may_pull() plays important role in packet
parsing for all protocols. And we did custom fragmentation of packets
emitted via tun (IFF_NAPI_FRAGS). However, it seems that it does not
give any results (bugs found), and I think the reason for this is that
linear data is rounded up and is usually quite large. So if a parsing
function does pskb_may_pull(1), or does not do it at all, it can
usually access more and it will go unnoticed. KASAN has an ability to
do custom poisoning: it can poison/unpoison any memory range, and then
detect any reads/writes to that range. What do you think about adding
custom KASAN poisoning to pskb_may_pull() and switching it to
non-eager mode (pull only what was requested) under KASAN? Do you
think it has potential for finding important bugs? What amount of work
is this?

Thanks

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2018-11-17  0:53 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-01-15 14:15 KASAN poisoning for skb linear data Dmitry Vyukov
2018-03-08  9:20 ` Dmitry Vyukov
2018-03-08 15:43   ` Stephen Hemminger
2018-11-17  0:52   ` Dmitry Vyukov
2018-03-08 15:45 ` Stephen Hemminger
2018-03-08 15:59   ` Dmitry Vyukov

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.