Received: by 2002:a05:6500:1b45:b0:1f5:f2ab:c469 with SMTP id cz5csp40873lqb; Tue, 16 Apr 2024 08:16:41 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVHZMgfe61P1RawgM8UBv0pqIQd4yRlZ5bjvXgQUuy793DeXZSwAJQy57Fgh12lK+lls9XXqvhOY7TN1Mx6ofIAt8ImXAtAsiaqqVlgvQ== X-Google-Smtp-Source: AGHT+IFCiFnX4OMZyDLlkVBwg6w1PmYj8UMtRAzdwM7+qVdRcMPhtJM990HNzCbY45wmnL+rZ3Pc X-Received: by 2002:a05:6a20:c886:b0:1a9:f2a5:6838 with SMTP id hb6-20020a056a20c88600b001a9f2a56838mr7666684pzb.18.1713280601248; Tue, 16 Apr 2024 08:16:41 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713280601; cv=pass; d=google.com; s=arc-20160816; b=Gr6GhIrcYj1unBMU/fJ2wiQjiM+IYXXdemP5W00k8Sl9hY46+nDrVG1fiA7A6FFDFC VNXwwlcxVx7UV/cXDj8zdkF2SBQVZrBPaLYT2knotpDnQvYBNQv8FEX+j4RxIAM66raj 64OooGEyGtphBuhyq6G3QOoo0E8OlXEaGyYD+sef1iSS/3ycsQU1A6/hRe00PhOIDLTI 482TkUHfAghlFpi7BcbpNQZNdUzI13jsarM4GJfikSHHoo0cdgHbN9LB2M3GnGN78b4o FhgYs4WSRfL8aXprjueVt/J1R50YWipcV9/BBiVrdS6wNojiV6OhQ68cnn+1M+LmpTcq hjRA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:dkim-signature; bh=8JSmIW6AisC0YGxh3A+gqhVtexddPmiOclf8d6UXDT8=; fh=Q0I+7B93swDxz0cXy5wg5vMSBuCzA5f+/VI9haUAIGk=; b=if5VfcjZfwW3gAm41xMMg/T+tiu9FtuNV6RQuffOsbe33kgF/a6r3ObXpORkM9Z0f2 OjG00ClW86TVjImoE9l/uayGaRKY51S3E6m2CY70yHG4r44AbkKlpqHsdOrx7D5wMdFX D6yj98OIqrV1tbaSGhyiG2BOlels9idLMQzou/8yHDnYu6y33gVCqJjsopp5DzDxEL16 mH7xxt9JBGcrw4NqC6UC6Tjw6giu8moLwMsvxAJwexSZ+E3+yMuVL69J/Pn8rZwKw1gN yqzxHE5MA2ZB3rlVwLeRud6183Mrilf0STOhtmkSUGMmxqfLledqRCm9joaETt44jzZ2 18bw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b="Q/DbuuJV"; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-147099-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-147099-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id w2-20020a056a0014c200b006eab069cdc0si6479952pfu.160.2024.04.16.08.16.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Apr 2024 08:16:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-147099-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b="Q/DbuuJV"; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-147099-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-147099-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id EA4CD2845E6 for ; Tue, 16 Apr 2024 15:16:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 28F2C131196; Tue, 16 Apr 2024 15:16:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Q/DbuuJV" Received: from mail-wr1-f49.google.com (mail-wr1-f49.google.com [209.85.221.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D5CCF131195; Tue, 16 Apr 2024 15:16:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.49 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713280576; cv=none; b=qg45Rgquuqm2QVIbZeg1U8zP0rBaD0ncBLYMZ6eJFi32R2/U4GkCqc45ohe0cRPksC1ubMvrYpG2Lf2PEwQz0jd5xdurd6xUp8iRxPsvfR+1Xx81Ya6tFOFQze33qK0guC9XXQre/TRu/TXJtw0BBeKS7jm0tWRB+eszvqNB1P4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713280576; c=relaxed/simple; bh=8JSmIW6AisC0YGxh3A+gqhVtexddPmiOclf8d6UXDT8=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=AOMmxQBIDnSd2tRELO/oVv18UUEWN31fp7R6sWepRp4zhC+MawXuVJH8k5QrIWKrcyASg4HpabMnKc3pk22SjKEH4NjcYELwlPbBSbLr+H/LUL3pqYdJ1tMMEQk0oOxBhddeKGs8jzWpwDTz4TkCt2En9ev8ObRgNAWRNzeFor0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=Q/DbuuJV; arc=none smtp.client-ip=209.85.221.49 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-wr1-f49.google.com with SMTP id ffacd0b85a97d-34388753650so2093317f8f.3; Tue, 16 Apr 2024 08:16:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1713280573; x=1713885373; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=8JSmIW6AisC0YGxh3A+gqhVtexddPmiOclf8d6UXDT8=; b=Q/DbuuJVW1xPZFx0ZONTjpKakpFzxfGzRkJfTzaJ4H4rP8jhBin/e/pLJcImw4ExzH 1jQDdTDuYywJuSrxMFRjd6kM+AiP+grCsoQYrKT4n1LvbTOeGnPUcB6XRAtadHHXdaoM CZYyUe8pqLbtChrgDmiYMBRS1TD8mS45sUt0J8Pgb/leq0Tu1EWPAfYNUAhFLfhaaihH 7FSu/MC/jf1zpfZWbY0JIPmlg1NnaHYTKfBhj6Y2FMOj6/HV+HJ6AvlzmyQWFx6KW0pS cPutLy330A32Cj4nzxJ4nglynYHqK/Uo4hJlMxr+8K7z2oHtU4990o0a7rjHFYZM5b2Z cGPg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1713280573; x=1713885373; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8JSmIW6AisC0YGxh3A+gqhVtexddPmiOclf8d6UXDT8=; b=buGH509nPtCa6MYgCHWYXLqRUouQtDmAo87zSqZQyS0ZRQBbxlJlnWnMc1qDuKngh4 bDtN5ySnZ9oq81K/crzJggJru+z+YOKGQtuxBYykMI+tgC96VRoi8aSZ5drRJ+HrB6w3 297MHAsFj2dEOE13EqhukSZ7cS4c9HZj4TvTi7OfWBBqitMm/aevJuXjM2js+/t3vmxA 8uCjhHx6xFMDtx7rrkXa+CDd+f3DZSpsBx8j6cLZNapj3xAgQWC69FVq7DQ8Y2BZdlie N2KiApA4Tu3v2+hheVDTiKUjeGeTrVnX7/OTWBQaoRK4YMxzqohvM/DITIqgIEfauyYq zsog== X-Forwarded-Encrypted: i=1; AJvYcCXFktKhLoQjbKh9uiThrRLkzTunLOQeZvcQ/avVW7HCsIAI/15mqiAga4oPRqAN1URHnEh5tq8oI9qH5XTf5l7T2YOL6rZy+KMXAaKZ1HzVcaTWYDHW9DAqubES7gG60/Ix X-Gm-Message-State: AOJu0YxUbOZBO8ZLIyZxbeuqDHKOtvrDmFVMc9v5dS/kwqHpwTjh+7U6 kbfbvXmK1Ag96vacfVj49yqnch4ZIW6zq5Gqwn9FO5ye0y0zeAf/pmRsGx0UyDLwu0nyxMeOsLT mcp6TDB4Fc6M/qol9WNPTRlcYZ7UTgvSP X-Received: by 2002:a05:6000:4c5:b0:346:ba70:f262 with SMTP id h5-20020a05600004c500b00346ba70f262mr9409969wri.14.1713280572902; Tue, 16 Apr 2024 08:16:12 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <000000000000fe696d0615f120bb@google.com> <20240415131837.411c6e05eb7b0af077d6424a@linux-foundation.org> In-Reply-To: From: Alexei Starovoitov Date: Tue, 16 Apr 2024 08:16:01 -0700 Message-ID: Subject: Re: [syzbot] [mm?] KMSAN: kernel-infoleak in bpf_probe_write_user To: Alexander Potapenko Cc: Andrew Morton , syzbot , LKML , linux-mm , syzkaller-bugs , bpf Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Tue, Apr 16, 2024 at 1:52=E2=80=AFAM Alexander Potapenko wrote: > > On Mon, Apr 15, 2024 at 11:06=E2=80=AFPM Alexei Starovoitov > wrote: > > > > Hi, > > > > syzbot folks, please disable such "bug" reporting. > > The whole point of bpf is to pass such info to userspace. > > probe_write_user, various ring buffers, bpf_*_printk-s, bpf maps > > all serve this purpose of "infoleak". > > > > Hi Alexei, > > From KMSAN's perspective it is fine to pass information to the > userspace, unless it is marked as uninitialized. > It could be that we are missing some initialization in kernel/bpf/core.c = though. > Do you know which part of the code is supposed to initialize the stack > in PROG_NAME? cap_bpf + cap_perfmon bpf program are allowed to read uninitialized stack. And recently we added commit e8742081db7d ("bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode") to shut up syzbot.