Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4643513pxj; Wed, 12 May 2021 09:55:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx1NYeHCbosppNbK0cSfZB9+ZhqobKhZVDqG71e1rhrfTc+QPUBnl9dYtXdag0w9conNBtF X-Received: by 2002:a17:907:7749:: with SMTP id kx9mr39250453ejc.90.1620838534464; Wed, 12 May 2021 09:55:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620838534; cv=none; d=google.com; s=arc-20160816; b=j+m9poL0MjEeAEdzOi7ZQanU97HJCPByukU0N3Pash5Pn6r8gdQBCJIRUqr2PMuk8n GRFdq5L5ZlPrXXXNlrLTwDNkdS7BPf9o3AFz+w77cmsqrksHMJM7Bp8yaPdyMBawSzZW Nq1eX57JruAQT84M9zPwh/NdmU9P8cdPT6J0C3OxIzc2Z0KV03Iw5c6i5mhW0cw+0jo3 5aQpLX+MCqziz5ovtxJiSdQLAvUN5GOPycqEleDd6nRAWR8zCefpjsnEr/L7tJMsV803 l1mDFP33+stOCL448K1XBdD9GcX4r99KnTyK5lR/Y+FIGnpAzhPv4M29qDoFupD0WFET 3x5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wA15IwmHD/+RQEnE9yJSOiYVhU6w9WGpydE56pYufnE=; b=UI3u25lmIgW8AO5rKdov7e1gnGtgmL+Iu05RdHAbJyYTP4jp/+SLvRSoUxLnhl3B+S zOo5w67dATPRQhOplEUnD3FQEdrdnw5++aG0MGWT6XPYlQ2Vfhik7itwBsT4GkMAvBKW Tx24vwgt1MzafMjaheAt9czOfhiWvfkOJrpiO8R+TzYeRIdICMmDbzARF98nPf51aexU lPhVXXAHIvbD1kZWd7LdJLzG2M1owc7m/ll6pwuSv8xfzawJgjuoNhXuoSNP3fI4bpOa xelwR1gr4qYjH/iN2jht+pyP1ZZFCVRgeu/v8zQmMPxRBa9kN29Gx2rC6Qhyp9hNh6mR nblA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xzJXdhOD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b1si554355ejb.448.2021.05.12.09.54.50; Wed, 12 May 2021 09:55:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xzJXdhOD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245127AbhELQwE (ORCPT + 99 others); Wed, 12 May 2021 12:52:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:50360 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237496AbhELPup (ORCPT ); Wed, 12 May 2021 11:50:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 299D261968; Wed, 12 May 2021 15:26:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620833164; bh=6diblhmDUfqyf0qKuIwIX8qZrb0QmaD8X3Ab+88qbG0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xzJXdhODnsEzknCV2oUp7wrN9Q7cpFg3nRZYJcmNyR6vgxzWtDwDGHytk58fWQvTC CsM9BRpzNZfLoKXyG3WhDXjMOhRtCHQEv2hfFAdDHzvfFAgxtefNRBxMIKqX5WUoxv UEO/0MIzkSB2KqhCDr4V2PRa5XlCcqAVu7DnF/6c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tetsuo Handa Subject: [PATCH 5.11 044/601] misc: vmw_vmci: explicitly initialize vmci_datagram payload Date: Wed, 12 May 2021 16:42:01 +0200 Message-Id: <20210512144829.274897739@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144827.811958675@linuxfoundation.org> References: <20210512144827.811958675@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tetsuo Handa commit b2192cfeba8481224da0a4ec3b4a7ccd80b1623b upstream. KMSAN complains that vmci_check_host_caps() left the payload part of check_msg uninitialized. ===================================================== BUG: KMSAN: uninit-value in kmsan_check_memory+0xd/0x10 CPU: 1 PID: 1 Comm: swapper/0 Tainted: G B 5.11.0-rc7+ #4 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020 Call Trace: dump_stack+0x21c/0x280 kmsan_report+0xfb/0x1e0 kmsan_internal_check_memory+0x202/0x520 kmsan_check_memory+0xd/0x10 iowrite8_rep+0x86/0x380 vmci_guest_probe_device+0xf0b/0x1e70 pci_device_probe+0xab3/0xe70 really_probe+0xd16/0x24d0 driver_probe_device+0x29d/0x3a0 device_driver_attach+0x25a/0x490 __driver_attach+0x78c/0x840 bus_for_each_dev+0x210/0x340 driver_attach+0x89/0xb0 bus_add_driver+0x677/0xc40 driver_register+0x485/0x8e0 __pci_register_driver+0x1ff/0x350 vmci_guest_init+0x3e/0x41 vmci_drv_init+0x1d6/0x43f do_one_initcall+0x39c/0x9a0 do_initcall_level+0x1d7/0x259 do_initcalls+0x127/0x1cb do_basic_setup+0x33/0x36 kernel_init_freeable+0x29a/0x3ed kernel_init+0x1f/0x840 ret_from_fork+0x1f/0x30 Uninit was created at: kmsan_internal_poison_shadow+0x5c/0xf0 kmsan_slab_alloc+0x8d/0xe0 kmem_cache_alloc+0x84f/0xe30 vmci_guest_probe_device+0xd11/0x1e70 pci_device_probe+0xab3/0xe70 really_probe+0xd16/0x24d0 driver_probe_device+0x29d/0x3a0 device_driver_attach+0x25a/0x490 __driver_attach+0x78c/0x840 bus_for_each_dev+0x210/0x340 driver_attach+0x89/0xb0 bus_add_driver+0x677/0xc40 driver_register+0x485/0x8e0 __pci_register_driver+0x1ff/0x350 vmci_guest_init+0x3e/0x41 vmci_drv_init+0x1d6/0x43f do_one_initcall+0x39c/0x9a0 do_initcall_level+0x1d7/0x259 do_initcalls+0x127/0x1cb do_basic_setup+0x33/0x36 kernel_init_freeable+0x29a/0x3ed kernel_init+0x1f/0x840 ret_from_fork+0x1f/0x30 Bytes 28-31 of 36 are uninitialized Memory access of size 36 starts at ffff8881675e5f00 ===================================================== Fixes: 1f166439917b69d3 ("VMCI: guest side driver implementation.") Cc: Signed-off-by: Tetsuo Handa Link: https://lore.kernel.org/r/20210402121742.3917-2-penguin-kernel@I-love.SAKURA.ne.jp Signed-off-by: Greg Kroah-Hartman --- drivers/misc/vmw_vmci/vmci_guest.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/misc/vmw_vmci/vmci_guest.c +++ b/drivers/misc/vmw_vmci/vmci_guest.c @@ -168,7 +168,7 @@ static int vmci_check_host_caps(struct p VMCI_UTIL_NUM_RESOURCES * sizeof(u32); struct vmci_datagram *check_msg; - check_msg = kmalloc(msg_size, GFP_KERNEL); + check_msg = kzalloc(msg_size, GFP_KERNEL); if (!check_msg) { dev_err(&pdev->dev, "%s: Insufficient memory\n", __func__); return -ENOMEM;