Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp568281imu; Thu, 3 Jan 2019 03:13:10 -0800 (PST) X-Google-Smtp-Source: ALg8bN5cIsht1w1hAGq0Qvmqo7j9ko1NcGGgkctnvCqWLseM9vgLYR8vVWfV0ReJ0vUNshZ+QkPS X-Received: by 2002:a63:bf0b:: with SMTP id v11mr16988694pgf.302.1546513990126; Thu, 03 Jan 2019 03:13:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546513990; cv=none; d=google.com; s=arc-20160816; b=mTjcHdihY78n2oEYf2vwWwVIvfPUV0PKxwXaM7+Y4YQHUI71VZP2kso6bALiPjS42Z Y1Izz/NMmC6sslTbRw2okmi+zrPQpRMXBZJaDZSty+6TWYL//8xOtD/lI0byXsZrlKO1 s4/90JdtSmeEuKowlRPzEQevCzsNd1HWuguYOnZwHW/Xj8yHrIOGBQjsTA8RvHSoaW5u Sd17J0f+JqBbDl7rJfhMUQyg5ureGpu6FYx2NS/nxcVPYgBZ2yg46lW1O5eMRepisSte T51+9nKgO+/SkzgRaOvTPWWjplY2VjcQpmkL+5W1jHRSecCYyl/G7NDXxE7c+uGonXoI RsSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:references:to:subject; bh=pz8mjqjYcILoWzFqzC2EpvUtLUkqxstNeOj9U1VoUpc=; b=YW3cHBj6b0gNGRjj9yUaM8hkpmYminFdiN1kyYEgr0HM5r33mgFeSxdR8wxYQt8MDQ RmdbsMG23wJxQbgYuDcsWfJifJACQMp70QqY9fn6xPBMnJZN7w1CamfFXy6+XT+kw0kh X/J2OETdiuqGUltK8qRRy5xOxYeJPQiXAK5xKWx19VONckpH0KiUSRMdUkLrRmZ+Qlqy l3EI++S8JHWg1fTo81p243/aCysN6tnPGbUC3TUvNVpKAHdK4F1v2huh1K+CktYaf+rt Mpv5+yW+/87/tthM4Qni6Em5C4hOXS2mcRpohkIa+iYzIIq8fekYX62SCTukcbD3E4M6 Ppeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t186si7513466pfd.68.2019.01.03.03.12.54; Thu, 03 Jan 2019 03:13:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728784AbfACIg6 (ORCPT + 99 others); Thu, 3 Jan 2019 03:36:58 -0500 Received: from mx2.suse.de ([195.135.220.15]:55062 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726191AbfACIg6 (ORCPT ); Thu, 3 Jan 2019 03:36:58 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 44418AE23; Thu, 3 Jan 2019 08:36:56 +0000 (UTC) Subject: Re: KMSAN: uninit-value in mpol_rebind_mm To: syzbot , aarcange@redhat.com, akpm@linux-foundation.org, glider@google.com, kirill.shutemov@linux.intel.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux@dominikbrodowski.net, mhocko@suse.com, rientjes@google.com, syzkaller-bugs@googlegroups.com, xieyisheng1@huawei.com, zhongjiang@huawei.com References: <000000000000c06550057e4cac7c@google.com> From: Vlastimil Babka Openpgp: preference=signencrypt Message-ID: Date: Thu, 3 Jan 2019 09:36:55 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.3.3 MIME-Version: 1.0 In-Reply-To: <000000000000c06550057e4cac7c@google.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/31/18 8:51 AM, syzbot wrote: > Hello, > > syzbot found the following crash on: > > HEAD commit: 79fc24ff6184 kmsan: highmem: use kmsan_clear_page() in cop.. > git tree: kmsan > console output: https://syzkaller.appspot.com/x/log.txt?x=13c48b67400000 > kernel config: https://syzkaller.appspot.com/x/.config?x=901dd030b2cc57e7 > dashboard link: https://syzkaller.appspot.com/bug?extid=b19c2dc2c990ea657a71 > compiler: clang version 8.0.0 (trunk 349734) > > Unfortunately, I don't have any reproducer for this crash yet. > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+b19c2dc2c990ea657a71@syzkaller.appspotmail.com > > ================================================================== > BUG: KMSAN: uninit-value in mpol_rebind_policy mm/mempolicy.c:353 [inline] > BUG: KMSAN: uninit-value in mpol_rebind_mm+0x249/0x370 mm/mempolicy.c:384 The report doesn't seem to indicate where the uninit value resides in the mempolicy object. I'll have to guess. mm/mempolicy.c:353 contains: if (!mpol_store_user_nodemask(pol) && nodes_equal(pol->w.cpuset_mems_allowed, *newmask)) "mpol_store_user_nodemask(pol)" is testing pol->flags, which I couldn't see being uninitialized after leaving mpol_new(). So I'll guess it's actually about accessing pol->w.cpuset_mems_allowed on line 354. For w.cpuset_mems_allowed to be not initialized and the nodes_equal() reachable for a mempolicy where mpol_set_nodemask() is called in do_mbind(), it seems the only possibility is a MPOL_PREFERRED policy with empty set of nodes, i.e. MPOL_LOCAL equivalent. Let's see if the patch below helps. This code is a maze to me. Note the uninit access should be benign, rebinding this kind of policy is always a no-op. ----8<---- From ff0ca29da6bc2572d7b267daa77ced6083e3f02d Mon Sep 17 00:00:00 2001 From: Vlastimil Babka Date: Thu, 3 Jan 2019 09:31:59 +0100 Subject: [PATCH] mm, mempolicy: fix uninit memory access --- mm/mempolicy.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/mempolicy.c b/mm/mempolicy.c index d4496d9d34f5..a0b7487b9112 100644 --- a/mm/mempolicy.c +++ b/mm/mempolicy.c @@ -350,7 +350,7 @@ static void mpol_rebind_policy(struct mempolicy *pol, const nodemask_t *newmask) { if (!pol) return; - if (!mpol_store_user_nodemask(pol) && + if (!mpol_store_user_nodemask(pol) && !(pol->flags & MPOL_F_LOCAL) && nodes_equal(pol->w.cpuset_mems_allowed, *newmask)) return; -- 2.19.2