Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp545218pxj; Thu, 20 May 2021 15:51:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwFY9TGGeF+1eMVmY8yJnkBS9VYMPzLIaIVZiMBDbDg4+ra8PHn+w9tK0xTZkSm/xYDbAzE X-Received: by 2002:a05:6638:260e:: with SMTP id m14mr8942694jat.83.1621551098685; Thu, 20 May 2021 15:51:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621551098; cv=none; d=google.com; s=arc-20160816; b=SJ6xGw9vTfby0nDs2iZ712SLYZTbtCLcQWZijvK1O7ayvV8WFkczPZmyzn4GYAsS9e SvdwFlTV0k8R9mQFpB8Xqve8HO+5KmkUMqoxUhBGdGVUrkHpdlD52CmvM/j0VdOQv42p 3F0mHSfrQ5EF5t5Y4Zw7BxPaTaU7vy+neZZYjAHbFfBmguBariXN3U04f/k3KB2nbwK/ L2fboTdIMdgmwn6DjeNvGBR4KE4diDIE2ceeBRoZPUhGp4Mf0/KsVgXxYOQGCXndYxfD xL8+5H84+6HlYeT0lgAS2uqsqEQcQoBfHcFrOHKU4SiJTCb2WDoMrxO541lFNLJnrSNT Vwyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=OVKHHAA4xy67K+oI5t3x6zzcSYXfa1fPmErU937Z2Dw=; b=luuf54EMPZamq7LTe8A9g2u+8DuscpvVlawxlzAjxSs8qu3ktFry/2bV1lyeGgYG6n 6Sljbd5z6M6LrA3Cn1wqPelAaJ08JagbTRmkHXbi5dl5AaksWPGTnnk67CksDbl73LiX qDpSLvQuWxFtc3vW7IvicOe/Ke3OSuiR0uKI9FneD6kx/GdGMbUxbWAaj0b8ug/sm8Ni N3ZGM2p8UZQ3rzAxRJD01NaoYrL/BU36mzujB15lIj2WRnVDvFPwl++AOdpPALnzF23+ FtjUtkStvli/9LX84jUskDlenTE1eKgwtBM+7w9cVC+jtTbi3lbfEQd/Yf3sPtJLmXAH xGoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=obD2omcP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w14si4700227ilu.141.2021.05.20.15.51.25; Thu, 20 May 2021 15:51:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=obD2omcP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240510AbhETLOh (ORCPT + 99 others); Thu, 20 May 2021 07:14:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:52442 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238416AbhETKyJ (ORCPT ); Thu, 20 May 2021 06:54:09 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CC92D61CD2; Thu, 20 May 2021 10:00:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621504853; bh=8moV59Cohi3DoS4TU1+cHNWrTSf3MH8xlY9ZdeK9UGo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=obD2omcP0cB/JZOFCh+2tUqOqy1Nnqdi/WSSWwR/DJGlkbwqvhXpBWeP5cHjfjzj9 oR7lHjvAeTsMFOdzbCzbJCzpUBBYYaH3nwIux104nG/TFBn8tEPFRLZblzxlMOpCqt BfnjdosWSbX5YXyocwPbiEqkoo3XL7/LhPyUn1vY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tetsuo Handa Subject: [PATCH 4.9 075/240] misc: vmw_vmci: explicitly initialize vmci_datagram payload Date: Thu, 20 May 2021 11:21:07 +0200 Message-Id: <20210520092111.200567131@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210520092108.587553970@linuxfoundation.org> References: <20210520092108.587553970@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tetsuo Handa commit b2192cfeba8481224da0a4ec3b4a7ccd80b1623b upstream. KMSAN complains that vmci_check_host_caps() left the payload part of check_msg uninitialized. ===================================================== BUG: KMSAN: uninit-value in kmsan_check_memory+0xd/0x10 CPU: 1 PID: 1 Comm: swapper/0 Tainted: G B 5.11.0-rc7+ #4 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020 Call Trace: dump_stack+0x21c/0x280 kmsan_report+0xfb/0x1e0 kmsan_internal_check_memory+0x202/0x520 kmsan_check_memory+0xd/0x10 iowrite8_rep+0x86/0x380 vmci_guest_probe_device+0xf0b/0x1e70 pci_device_probe+0xab3/0xe70 really_probe+0xd16/0x24d0 driver_probe_device+0x29d/0x3a0 device_driver_attach+0x25a/0x490 __driver_attach+0x78c/0x840 bus_for_each_dev+0x210/0x340 driver_attach+0x89/0xb0 bus_add_driver+0x677/0xc40 driver_register+0x485/0x8e0 __pci_register_driver+0x1ff/0x350 vmci_guest_init+0x3e/0x41 vmci_drv_init+0x1d6/0x43f do_one_initcall+0x39c/0x9a0 do_initcall_level+0x1d7/0x259 do_initcalls+0x127/0x1cb do_basic_setup+0x33/0x36 kernel_init_freeable+0x29a/0x3ed kernel_init+0x1f/0x840 ret_from_fork+0x1f/0x30 Uninit was created at: kmsan_internal_poison_shadow+0x5c/0xf0 kmsan_slab_alloc+0x8d/0xe0 kmem_cache_alloc+0x84f/0xe30 vmci_guest_probe_device+0xd11/0x1e70 pci_device_probe+0xab3/0xe70 really_probe+0xd16/0x24d0 driver_probe_device+0x29d/0x3a0 device_driver_attach+0x25a/0x490 __driver_attach+0x78c/0x840 bus_for_each_dev+0x210/0x340 driver_attach+0x89/0xb0 bus_add_driver+0x677/0xc40 driver_register+0x485/0x8e0 __pci_register_driver+0x1ff/0x350 vmci_guest_init+0x3e/0x41 vmci_drv_init+0x1d6/0x43f do_one_initcall+0x39c/0x9a0 do_initcall_level+0x1d7/0x259 do_initcalls+0x127/0x1cb do_basic_setup+0x33/0x36 kernel_init_freeable+0x29a/0x3ed kernel_init+0x1f/0x840 ret_from_fork+0x1f/0x30 Bytes 28-31 of 36 are uninitialized Memory access of size 36 starts at ffff8881675e5f00 ===================================================== Fixes: 1f166439917b69d3 ("VMCI: guest side driver implementation.") Cc: Signed-off-by: Tetsuo Handa Link: https://lore.kernel.org/r/20210402121742.3917-2-penguin-kernel@I-love.SAKURA.ne.jp Signed-off-by: Greg Kroah-Hartman --- drivers/misc/vmw_vmci/vmci_guest.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/misc/vmw_vmci/vmci_guest.c +++ b/drivers/misc/vmw_vmci/vmci_guest.c @@ -172,7 +172,7 @@ static int vmci_check_host_caps(struct p VMCI_UTIL_NUM_RESOURCES * sizeof(u32); struct vmci_datagram *check_msg; - check_msg = kmalloc(msg_size, GFP_KERNEL); + check_msg = kzalloc(msg_size, GFP_KERNEL); if (!check_msg) { dev_err(&pdev->dev, "%s: Insufficient memory\n", __func__); return -ENOMEM;