From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-yw0-f169.google.com ([209.85.161.169]:34978 "EHLO mail-yw0-f169.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750732AbdAWPtL (ORCPT ); Mon, 23 Jan 2017 10:49:11 -0500 Received: by mail-yw0-f169.google.com with SMTP id l19so139320809ywc.2 for ; Mon, 23 Jan 2017 07:49:10 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <5792bbb6-04e7-d3b2-b5cf-af628f4cac16@fb.com> References: <20170123140643.32805-1-glider@google.com> <5792bbb6-04e7-d3b2-b5cf-af628f4cac16@fb.com> From: Alexander Potapenko Date: Mon, 23 Jan 2017 16:49:09 +0100 Message-ID: Subject: Re: [PATCH] block: Initialize cfqq->ioprio_class in cfq_get_queue() To: Jens Axboe Cc: Dmitriy Vyukov , Kostya Serebryany , Tahsin Erdogan , LKML , linux-block@vger.kernel.org Content-Type: text/plain; charset=UTF-8 Sender: linux-block-owner@vger.kernel.org List-Id: linux-block@vger.kernel.org On Mon, Jan 23, 2017 at 4:30 PM, Jens Axboe wrote: > On 01/23/2017 07:06 AM, Alexander Potapenko wrote: >> KMSAN (KernelMemorySanitizer, a new error detection tool) reports use of >> uninitialized memory in cfq_init_cfqq(): >> >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >> BUG: KMSAN: use of unitialized memory >> ... >> Call Trace: >> [< inline >] __dump_stack lib/dump_stack.c:15 >> [] dump_stack+0x157/0x1d0 lib/dump_stack.c:51 >> [] kmsan_report+0x205/0x360 ??:? >> [] __msan_warning+0x5b/0xb0 ??:? >> [< inline >] cfq_init_cfqq block/cfq-iosched.c:3754 >> [] cfq_get_queue+0xc80/0x14d0 block/cfq-iosched.c:385= 7 >> ... >> origin: >> [] save_stack_trace+0x27/0x50 arch/x86/kernel/stacktr= ace.c:67 >> [] kmsan_internal_poison_shadow+0xab/0x150 ??:? >> [] kmsan_poison_slab+0xbb/0x120 ??:? >> [< inline >] allocate_slab mm/slub.c:1627 >> [] new_slab+0x3af/0x4b0 mm/slub.c:1641 >> [< inline >] new_slab_objects mm/slub.c:2407 >> [] ___slab_alloc+0x323/0x4a0 mm/slub.c:2564 >> [< inline >] __slab_alloc mm/slub.c:2606 >> [< inline >] slab_alloc_node mm/slub.c:2669 >> [] kmem_cache_alloc_node+0x1d2/0x1f0 mm/slub.c:2746 >> [] cfq_get_queue+0x47d/0x14d0 block/cfq-iosched.c:385= 0 >> ... >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >> (the line numbers are relative to 4.8-rc6, but the bug persists >> upstream) >> >> The uninitialized struct cfq_queue is created by kmem_cache_alloc_node() >> and then passed to cfq_init_cfqq(), which accesses cfqq->ioprio_class >> before it's initialized. > > Patch looks fine to me, thanks. Is this a new warning? We don't seem > to have changed this path in a while, yet I wonder why this is only > surfacing now. This is because KMSAN is a new tool, it's not in the trunk yet. Nobody could see this warning before. I don't know if kmemcheck detects this bug (and if anyone is actively using it for testing either). > -- > Jens Axboe > --=20 Alexander Potapenko Software Engineer Google Germany GmbH Erika-Mann-Stra=C3=9Fe, 33 80636 M=C3=BCnchen Gesch=C3=A4ftsf=C3=BChrer: Matthew Scott Sucherman, Paul Terence Manicle Registergericht und -nummer: Hamburg, HRB 86891 Sitz der Gesellschaft: Hamburg From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751184AbdAWPtM (ORCPT ); Mon, 23 Jan 2017 10:49:12 -0500 Received: from mail-yw0-f180.google.com ([209.85.161.180]:34977 "EHLO mail-yw0-f180.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750725AbdAWPtL (ORCPT ); Mon, 23 Jan 2017 10:49:11 -0500 MIME-Version: 1.0 In-Reply-To: <5792bbb6-04e7-d3b2-b5cf-af628f4cac16@fb.com> References: <20170123140643.32805-1-glider@google.com> <5792bbb6-04e7-d3b2-b5cf-af628f4cac16@fb.com> From: Alexander Potapenko Date: Mon, 23 Jan 2017 16:49:09 +0100 Message-ID: Subject: Re: [PATCH] block: Initialize cfqq->ioprio_class in cfq_get_queue() To: Jens Axboe Cc: Dmitriy Vyukov , Kostya Serebryany , Tahsin Erdogan , LKML , linux-block@vger.kernel.org Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by mail.home.local id v0NFnGbq003407 On Mon, Jan 23, 2017 at 4:30 PM, Jens Axboe wrote: > On 01/23/2017 07:06 AM, Alexander Potapenko wrote: >> KMSAN (KernelMemorySanitizer, a new error detection tool) reports use of >> uninitialized memory in cfq_init_cfqq(): >> >> ================================================================== >> BUG: KMSAN: use of unitialized memory >> ... >> Call Trace: >> [< inline >] __dump_stack lib/dump_stack.c:15 >> [] dump_stack+0x157/0x1d0 lib/dump_stack.c:51 >> [] kmsan_report+0x205/0x360 ??:? >> [] __msan_warning+0x5b/0xb0 ??:? >> [< inline >] cfq_init_cfqq block/cfq-iosched.c:3754 >> [] cfq_get_queue+0xc80/0x14d0 block/cfq-iosched.c:3857 >> ... >> origin: >> [] save_stack_trace+0x27/0x50 arch/x86/kernel/stacktrace.c:67 >> [] kmsan_internal_poison_shadow+0xab/0x150 ??:? >> [] kmsan_poison_slab+0xbb/0x120 ??:? >> [< inline >] allocate_slab mm/slub.c:1627 >> [] new_slab+0x3af/0x4b0 mm/slub.c:1641 >> [< inline >] new_slab_objects mm/slub.c:2407 >> [] ___slab_alloc+0x323/0x4a0 mm/slub.c:2564 >> [< inline >] __slab_alloc mm/slub.c:2606 >> [< inline >] slab_alloc_node mm/slub.c:2669 >> [] kmem_cache_alloc_node+0x1d2/0x1f0 mm/slub.c:2746 >> [] cfq_get_queue+0x47d/0x14d0 block/cfq-iosched.c:3850 >> ... >> ================================================================== >> (the line numbers are relative to 4.8-rc6, but the bug persists >> upstream) >> >> The uninitialized struct cfq_queue is created by kmem_cache_alloc_node() >> and then passed to cfq_init_cfqq(), which accesses cfqq->ioprio_class >> before it's initialized. > > Patch looks fine to me, thanks. Is this a new warning? We don't seem > to have changed this path in a while, yet I wonder why this is only > surfacing now. This is because KMSAN is a new tool, it's not in the trunk yet. Nobody could see this warning before. I don't know if kmemcheck detects this bug (and if anyone is actively using it for testing either). > -- > Jens Axboe > -- Alexander Potapenko Software Engineer Google Germany GmbH Erika-Mann-Straße, 33 80636 München Geschäftsführer: Matthew Scott Sucherman, Paul Terence Manicle Registergericht und -nummer: Hamburg, HRB 86891 Sitz der Gesellschaft: Hamburg