Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp309845pxj; Thu, 20 May 2021 09:49:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwImP9dSA9kStS2gDRBRWFpfX/OH1xQidkWnih1ZXiS3kO604ZVaWqRnYePZrrlilC4WcSb X-Received: by 2002:a50:cc0c:: with SMTP id m12mr5899696edi.141.1621529356633; Thu, 20 May 2021 09:49:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621529356; cv=none; d=google.com; s=arc-20160816; b=IqLMjctThxcDA/S3JLlV8heMz0SIHnrUQy31Nq9CU6KmhdBZqiqHQwVvhO9DW+kDsd aEJzz/NPBsJudgoVs76wGWHxbi78+dapRLRHHyPrkhscK4HpKo7Xf2RCxbuKf5DqzTM5 7A3kik32kdgcVdnXasH36tCvPS2doqyk/naRQeregPwi+o1A2UsYvDMmA5JzeM9BdHv9 KaE/vR4/jVOwiRInrkcF/o+Ew+jXK5gGsvRttFlrckiCUlFzwUY06aO504x8nDndXdBq Yxctmr4dBDRabaqjOSa0gDD2Y1JO7GmZKyi0fzvqHNvw5C5rSl8DpxaeHkdLyhbaAeRS k/dg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=qXmvX1devogn4a+t6DVp+146R82aoVhznTmeFkRKnF0=; b=Zl/oXn6aCRvJ+/ArPen/mHdM5103cK4H813BIIIkfYd8d5b1q4/9g/jNZmuTvR9vs1 Mjpn9HXe/6AYymyjph5KJKbuIM0iFQNhTDnHBTvK3xs7+IchTEr7pl+R/2ifQKFUMGi+ 93mnRonvdQ0rlP7Zl5r9HdrtWfAMgHnoWSC0TpK2+7xUlIj7wJg6Deez4e+UmjrSDp0X WAYmKYAMCwQVznZs3WU4uqibquKahCGjDF3PAy3DaW87xMHh0bGugXQufBcDZHaBgEmG Dj9LWHyz3j/pNQxr5kiP+WUuN6oQdz39YtkU0nvweA5LJeTy71D01BLytHMYF8+E1TGm mftA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ucBBvLuM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s11si2714532edx.117.2021.05.20.09.48.53; Thu, 20 May 2021 09:49:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ucBBvLuM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234565AbhETJuG (ORCPT + 99 others); Thu, 20 May 2021 05:50:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:46618 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234025AbhETJrZ (ORCPT ); Thu, 20 May 2021 05:47:25 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5429461457; Thu, 20 May 2021 09:34:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621503256; bh=xix8bAIQHk01R+mSm4qOXOstWPRJzFpE70gb+hsBdXw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ucBBvLuMfo+/4nU8L4V92cxlePSYkZ+42aCzB6jiy06dZMHvu+XhUtDkxw0jseGI7 5scU2AQEoXiqld7OH+1HcWQSniLZRklg4aMRUeQYjAQfXWvi/DP9vra62LaBb8Rsrj C14GiURBfWqQF6X1/INMXjSn9IylOBZF+m1dlE14= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tetsuo Handa Subject: [PATCH 4.19 138/425] misc: vmw_vmci: explicitly initialize vmci_datagram payload Date: Thu, 20 May 2021 11:18:27 +0200 Message-Id: <20210520092135.970905862@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210520092131.308959589@linuxfoundation.org> References: <20210520092131.308959589@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tetsuo Handa commit b2192cfeba8481224da0a4ec3b4a7ccd80b1623b upstream. KMSAN complains that vmci_check_host_caps() left the payload part of check_msg uninitialized. ===================================================== BUG: KMSAN: uninit-value in kmsan_check_memory+0xd/0x10 CPU: 1 PID: 1 Comm: swapper/0 Tainted: G B 5.11.0-rc7+ #4 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020 Call Trace: dump_stack+0x21c/0x280 kmsan_report+0xfb/0x1e0 kmsan_internal_check_memory+0x202/0x520 kmsan_check_memory+0xd/0x10 iowrite8_rep+0x86/0x380 vmci_guest_probe_device+0xf0b/0x1e70 pci_device_probe+0xab3/0xe70 really_probe+0xd16/0x24d0 driver_probe_device+0x29d/0x3a0 device_driver_attach+0x25a/0x490 __driver_attach+0x78c/0x840 bus_for_each_dev+0x210/0x340 driver_attach+0x89/0xb0 bus_add_driver+0x677/0xc40 driver_register+0x485/0x8e0 __pci_register_driver+0x1ff/0x350 vmci_guest_init+0x3e/0x41 vmci_drv_init+0x1d6/0x43f do_one_initcall+0x39c/0x9a0 do_initcall_level+0x1d7/0x259 do_initcalls+0x127/0x1cb do_basic_setup+0x33/0x36 kernel_init_freeable+0x29a/0x3ed kernel_init+0x1f/0x840 ret_from_fork+0x1f/0x30 Uninit was created at: kmsan_internal_poison_shadow+0x5c/0xf0 kmsan_slab_alloc+0x8d/0xe0 kmem_cache_alloc+0x84f/0xe30 vmci_guest_probe_device+0xd11/0x1e70 pci_device_probe+0xab3/0xe70 really_probe+0xd16/0x24d0 driver_probe_device+0x29d/0x3a0 device_driver_attach+0x25a/0x490 __driver_attach+0x78c/0x840 bus_for_each_dev+0x210/0x340 driver_attach+0x89/0xb0 bus_add_driver+0x677/0xc40 driver_register+0x485/0x8e0 __pci_register_driver+0x1ff/0x350 vmci_guest_init+0x3e/0x41 vmci_drv_init+0x1d6/0x43f do_one_initcall+0x39c/0x9a0 do_initcall_level+0x1d7/0x259 do_initcalls+0x127/0x1cb do_basic_setup+0x33/0x36 kernel_init_freeable+0x29a/0x3ed kernel_init+0x1f/0x840 ret_from_fork+0x1f/0x30 Bytes 28-31 of 36 are uninitialized Memory access of size 36 starts at ffff8881675e5f00 ===================================================== Fixes: 1f166439917b69d3 ("VMCI: guest side driver implementation.") Cc: Signed-off-by: Tetsuo Handa Link: https://lore.kernel.org/r/20210402121742.3917-2-penguin-kernel@I-love.SAKURA.ne.jp Signed-off-by: Greg Kroah-Hartman --- drivers/misc/vmw_vmci/vmci_guest.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/misc/vmw_vmci/vmci_guest.c +++ b/drivers/misc/vmw_vmci/vmci_guest.c @@ -169,7 +169,7 @@ static int vmci_check_host_caps(struct p VMCI_UTIL_NUM_RESOURCES * sizeof(u32); struct vmci_datagram *check_msg; - check_msg = kmalloc(msg_size, GFP_KERNEL); + check_msg = kzalloc(msg_size, GFP_KERNEL); if (!check_msg) { dev_err(&pdev->dev, "%s: Insufficient memory\n", __func__); return -ENOMEM;