Received: by 2002:a05:7412:8d11:b0:fa:4934:9f with SMTP id bj17csp542013rdb; Mon, 15 Jan 2024 05:51:22 -0800 (PST) X-Google-Smtp-Source: AGHT+IHHIzrrwb4Sfj5oxwztuokZSABaa6st8v1dkz2SZQKhyqGYc23E5Nsoxl+F9uJEek/OfZbU X-Received: by 2002:a05:622a:15c9:b0:429:c70d:1c01 with SMTP id d9-20020a05622a15c900b00429c70d1c01mr8009691qty.55.1705326682578; Mon, 15 Jan 2024 05:51:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705326682; cv=none; d=google.com; s=arc-20160816; b=PX2qFJkzUd3RfOVZ9eMKo8lIMMXfsH0PfEPWJtrLmVYzIgz6tl2/STxYjTSfcOQt/q GR3mxEhY7Wonf86YHuU+apyAZmSDa4YGk9v3OXRyrSMtGNmLY7ke11XOzHV/Mv+ab9e7 9tvaqy/38P5SZJaHpXaERyzSxk2W3GDPi28XkShAewYrUeeeo+llpn4yEoWNzR4Ckd3i MkfDu5Inv9mk0LnBR+eC46Y6ICWhGd7F3pIjagrpbona/8rLM5619+cxfduwL0TdY1eK TY1w0xxsX3yT9TbnDcJQH+uxHCmRuamm2Vkku8VRDAjzxw5IPBW1raXFxzd1/thRtG1T kEKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=U4c6miV7ad4Ra6JMKEnKkM21uAvLmFG2cCboEZVVEXc=; fh=wmY/TPqFyDYKOPmya9qZw0Ram6LXse5cGysxSUyAXeg=; b=rslDuJWgSYkR+I/vAHRaPDrJkvBfAx6eK5XrVzyiRKXN7Q3JJe+E50GC86ycYJTIN6 CSv/1lMkwRwHLFIZ9QPgEM9RvzMVeY1hgE9KcKmZJrKRk5oHulpBDuaGmaAiSvxauR4m 7n1u6OXQGT/8oGVrsHmUXPkpTyUXRzX2W+L1rTOYYEZz3Wy/zW/MUX6e0nUY019Hqg+P poZ7EpYXExnx6lofJjpr/EPo8WIyfclB17GWxX7AjbnPQ6UPnC9eiY/mRMp3gq7HC2ex k8qMWxRcc/F1NoEziRQt7ZzEiBm9cpj1NxAVYQ0OC5lg8YT6dJROk0FzTFe8BRQJgQp4 o8Fg== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@kernel.org header.s=k20201202 header.b="q/EZjsy9"; spf=pass (google.com: domain of linux-kernel+bounces-26054-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-26054-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id o8-20020a05622a138800b004237660db14si8029333qtk.338.2024.01.15.05.51.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 15 Jan 2024 05:51:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-26054-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@kernel.org header.s=k20201202 header.b="q/EZjsy9"; spf=pass (google.com: domain of linux-kernel+bounces-26054-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-26054-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 5622B1C21AA1 for ; Mon, 15 Jan 2024 13:51:22 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 549CD17598; Mon, 15 Jan 2024 13:50:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="q/EZjsy9" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 70FDF17577; Mon, 15 Jan 2024 13:50:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E9F5AC433F1; Mon, 15 Jan 2024 13:50:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705326656; bh=BPKbcav8hKWyYniO8mP6S8bRiXKYHLnZvQiLfUnWJCE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=q/EZjsy9OEGxpKnOuSUsPbLrTxrXFT+yOVg5M9WUaBOZw/s8FNAWV7u5iIDQdlhNn 2Q6JiJ6YSLClAKQChialuCcfOhLwdp7oszZU1qO5+hAjSqdSElJSpMO32eBQ8JISPU uFQb000fKROVzqr1DqlVmVfSe+7U6P8LI+9vRZ/h1kcX7KGt5HslG2X4xUzzkS1j6Q fgO7W9vRPruy9LMBtFh6rY+xvpgqOrOfAdy4H6HjsbpLdIf55zchy7IPMujDsfoQjr PNbM+3IE+jnay2p/EyHp7fJ8Xle1sdWulkG3ZwFeT0JrNwzjyOtYOEMbg0caKIwJ8Y hlqv1zcSRFCtw== Date: Mon, 15 Jan 2024 13:50:51 +0000 From: Simon Horman To: Eric Dumazet Cc: Jens Axboe , linux-kernel , netdev@vger.kernel.org, Eric Dumazet , syzbot , stable@vger.kernel.org, Josef Bacik , linux-block@vger.kernel.org, nbd@other.debian.org Subject: Re: [PATCH net] nbd: always initialize struct msghdr completely Message-ID: <20240115135051.GA432001@kernel.org> References: <20240112132657.647112-1-edumazet@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240112132657.647112-1-edumazet@google.com> On Fri, Jan 12, 2024 at 01:26:57PM +0000, Eric Dumazet wrote: > syzbot complains that msg->msg_get_inq value can be uninitialized [1] > > struct msghdr got many new fields recently, we should always make > sure their values is zero by default. > > [1] > BUG: KMSAN: uninit-value in tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571 > tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571 > inet_recvmsg+0x131/0x580 net/ipv4/af_inet.c:879 > sock_recvmsg_nosec net/socket.c:1044 [inline] > sock_recvmsg+0x12b/0x1e0 net/socket.c:1066 > __sock_xmit+0x236/0x5c0 drivers/block/nbd.c:538 > nbd_read_reply drivers/block/nbd.c:732 [inline] > recv_work+0x262/0x3100 drivers/block/nbd.c:863 > process_one_work kernel/workqueue.c:2627 [inline] > process_scheduled_works+0x104e/0x1e70 kernel/workqueue.c:2700 > worker_thread+0xf45/0x1490 kernel/workqueue.c:2781 > kthread+0x3ed/0x540 kernel/kthread.c:388 > ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147 > ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242 > > Local variable msg created at: > __sock_xmit+0x4c/0x5c0 drivers/block/nbd.c:513 > nbd_read_reply drivers/block/nbd.c:732 [inline] > recv_work+0x262/0x3100 drivers/block/nbd.c:863 > > CPU: 1 PID: 7465 Comm: kworker/u5:1 Not tainted 6.7.0-rc7-syzkaller-00041-gf016f7547aee #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 > Workqueue: nbd5-recv recv_work > > Fixes: f94fd25cb0aa ("tcp: pass back data left in socket after receive") > Reported-by: syzbot > Signed-off-by: Eric Dumazet Reviewed-by: Simon Horman ..