Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2547411imm; Thu, 7 Jun 2018 12:31:01 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIp9Q4MODniyJ/U/2ZRn5IEAGguqvxPDZ5EXkaMWqyPsjYKshneV399r19uqHpJlbLfQi/Z X-Received: by 2002:a63:8a4a:: with SMTP id y71-v6mr2540890pgd.291.1528399861851; Thu, 07 Jun 2018 12:31:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528399861; cv=none; d=google.com; s=arc-20160816; b=HVEZ5sJ4EEyxR7lA1fEuRUw7yxwetpgSWe/ItYPamifSo6OvWK56CCDY3Bn3DT2Khr sTl7Y5btIP0paG4POy6hqmnARBAIXDHSX0sJ/S3bki8z5oKsEuQRxte6LLvjpHccPqmE Cmg4gwCVogCjIOYO6fvBK2vI0rGXcHnn4riU8ErgSBoVQ+BGRNwMBxtZ6tPWhpCJMQRK NjRBqKtoshNQHKKs68NK/cKNuSGiANb0un05aSfTJOwtIAS4HHgvYzDCdGWWgjh47zg9 kxKlH06FshDpzRmSgPMFn1NWTggZFWc1uDGasksTgEU0NXEeDZLM2konXcMzbGqSPEwN dygw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=+4NiZI/yGLNL4iYY8ase9eHb2UeL187v7gpFKm8LCmk=; b=TFi75H1tkEIYMIBWGPYJaO95TS63+pNVeq7Uwx4RtluO8mpCZG8rOoP0jXjwIFRIdS CxQE9HzKPy+htfHSlnXDHXzlDpNKSsMpafDYVQPsKn3JPr9G+jf7S5eifyjaR36+D/xZ aFHV2qQ4FaqiztDfFRJUjZowNBYHMbS5SgidCyc6DqMjCZZ1nteQrBbm8vIs7B6Je5kg 9l7CqXZgycfB6Bb6i7zPF4HBQP554VjnTy0SUCFmhfSLOoheUy48ys/laHQVsc28sa9p nIK4Dk+MIhIJPUF9P7Jk80cGZT1EtwT7ep1ZG7WXstaMG2APe1HP55ofpTfHxLPSPxsj zyaQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r3-v6si8612678pli.18.2018.06.07.12.30.45; Thu, 07 Jun 2018 12:31:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932389AbeFGT3R (ORCPT + 99 others); Thu, 7 Jun 2018 15:29:17 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:43888 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932124AbeFGT3Q (ORCPT ); Thu, 7 Jun 2018 15:29:16 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 42562BB424; Thu, 7 Jun 2018 19:29:15 +0000 (UTC) Received: from redhat.com (ovpn-120-206.rdu2.redhat.com [10.10.120.206]) by smtp.corp.redhat.com (Postfix) with SMTP id D5D4810F1C1C; Thu, 7 Jun 2018 19:29:13 +0000 (UTC) Date: Thu, 7 Jun 2018 22:29:13 +0300 From: "Michael S. Tsirkin" To: Al Viro Cc: syzbot , avagin@openvz.org, davem@davemloft.net, dingtianhong@huawei.com, edumazet@google.com, elena.reshetova@intel.com, jasowang@redhat.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, matthew@mjdsystems.ca, mingo@kernel.org, netdev@vger.kernel.org, pabeni@redhat.com, syzkaller-bugs@googlegroups.com, virtualization@lists.linux-foundation.org, willemb@google.com Subject: Re: KMSAN: uninit-value in _copy_to_iter (2) Message-ID: <20180607222728-mutt-send-email-mst@kernel.org> References: <000000000000a5b2b1056a86e98c@google.com> <000000000000cf4578056ab12452@google.com> <20180607183627-mutt-send-email-mst@kernel.org> <20180607174355.GR30522@ZenIV.linux.org.uk> <20180607205611-mutt-send-email-mst@kernel.org> <20180607180449.GS30522@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180607180449.GS30522@ZenIV.linux.org.uk> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Thu, 07 Jun 2018 19:29:15 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Thu, 07 Jun 2018 19:29:15 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'mst@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 07, 2018 at 07:04:49PM +0100, Al Viro wrote: > On Thu, Jun 07, 2018 at 08:59:06PM +0300, Michael S. Tsirkin wrote: > > On Thu, Jun 07, 2018 at 06:43:55PM +0100, Al Viro wrote: > > > On Thu, Jun 07, 2018 at 06:38:48PM +0300, Michael S. Tsirkin wrote: > > > > #syz test: https://github.com/google/kmsan.git/master d2d741e5d1898dfde1a75ea3d29a9a3e2edf0617 > > > > > > > > Subject: vhost: fix info leak > > > > > > > > Fixes: CVE-2018-1118 > > > > Signed-off-by: Michael S. Tsirkin > > > > --- > > > > diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c > > > > index f0be5f35ab28..9beefa6ed1ce 100644 > > > > --- a/drivers/vhost/vhost.c > > > > +++ b/drivers/vhost/vhost.c > > > > @@ -2345,6 +2345,9 @@ struct vhost_msg_node *vhost_new_msg(struct vhost_virtqueue *vq, int type) > > > > struct vhost_msg_node *node = kmalloc(sizeof *node, GFP_KERNEL); > > > > if (!node) > > > > return NULL; > > > > + > > > > + /* Make sure all padding within the structure is initialized. */ > > > > + memset(&node->msg, 0, sizeof node->msg); > > > > > > Umm... Maybe kzalloc(), then? You have > > > > > > struct vhost_msg_node { > > > struct vhost_msg msg; > > > struct vhost_virtqueue *vq; > > > struct list_head node; > > > }; > > > > > > and that's what, 68 bytes in msg, then either 4 bytes pointer or > > > 4 bytes padding + 8 bytes pointer, then two pointers? How much > > > does explicit partial memset() save you here? > > > > Yes but 0 isn't a nop here so if this struct is used without > > a sensible initialization, it will crash elsewhere. > > I prefer KASAN to catch such uses. > > > > > > > > node->vq = vq; > > > > node->msg.type = type; > > IDGI - what would your variant catch that kzalloc + 2 assignments won't? > Accesses to uninitialized ->node? Because that's the only difference in > what is and is not initialized between those variants... For now yes but we'll likely add more fields in this structure down the road, which is where I'd expect new bugs to come from. -- MST