Are these overflows a security issue?
Like giving up valid kernel memory. 

--
Cryo:William J. Coldwell ARIN:WC25/AS7769 PGP:0xF97CC215/0x5E9944455
Warped, Inc. warped.com Founder/CTO 661-WARPED1 @warped @deadjournal
NetBSD netbsd.org/pkgsrc.org President,Project Security,Social Media
"Put on 3D glasses, otherwise you only see in 1½D.”  [self opinion];

> On Sep 9, 2016, at 03:54, Martin Husemann <[email protected]> wrote:
> 
> As mentioned in the other thread here, I am trying to make ktrace output
> working for netbsd32 emulated ktrace/kdump.
> 
> The patch below allows emulations to override the "msghdr" ktrace data
> output by various variants of sendmsg/recvmsg. This is simmply done by
> passing two new args to do_sys_sendmsg()/do_sys_recvmsg() and friends
> which provide alternative  data to record in the ktrace record.
> 
> Since a full msgheader is not always conveniently available, it is also
> possible to pass a NULL pointer and ~0U as size to skip this ktrace
> record completely.
> 
> If passing NULL/0 as the new args, the native msghdr is output, which means
> most callers simply needed adding "NULL, 0," in the argument list.
> 
> A few compat versions are missing here, but will be added before commit.
> 
> Any objections?
> 
> Martin
> <ktr_recvsend.patch>

Reply via email to