From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-alma10-1.taild15c8.ts.net [100.103.45.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DA30A3A5426; Wed, 20 May 2026 18:31:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=100.103.45.18 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779301910; cv=none; b=RRDU4fo9PIXpx1tGLcSUzjHIxlibvEGhJbobLVLBBxdsB8fBvqcPUw11cDqd5MCDWTdvmk9Vopzpz/yiKEWi4QCavZY0KLih257Z770v1Ao9YvwWbhR+ivfrpNGZqE62WrdGIrW3mYPrY/tBZgPt+1mLAZmFJBcuz/HHkDXViJc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779301910; c=relaxed/simple; bh=71rVe3TTaEvbyironCddrNXKxZj/akZh8DRKvBiCKw0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Sh/6UXLt8IDSd/kCOX+xIM9aftcUuSjiYGmT2P7o0g4RAlw1Qg8uOzARgH3ktcT9175UwdRhmiDJVxiaeVmvg+Qfjn+QtocW66Owo9lGhwx24fd2yO41mJDCD9N86Nea31kHzk+BDTylmSAoT/HxGMgG7rTe1OcmrZfWx6URwrc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=p+TWpiEh; arc=none smtp.client-ip=100.103.45.18 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="p+TWpiEh" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4B81C1F000E9; Wed, 20 May 2026 18:31:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=korg; t=1779301908; bh=0pk3A3ID1ustVBUb2pnJuZSyc25MXMXYoQW+Swy76tw=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=p+TWpiEhh5ogTxMdlYo11Jul7wcetBBO+DHCwlbguKhRBU8a+7TxyYB+J4YzD9vwz E7HQE4ulO9mRwnuWmm8p09+qPMYyTxj64eHlI5QwtHkFLNzrpn0QnrgtqOcrcFggGV W1uU+p6YC6XHP93R6deCls5PUa02yB9HNF74AedQ= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, syzbot+ecdb8c9878a81eb21e54@syzkaller.appspotmail.com, Mashiro Chen , Simon Horman , Jakub Kicinski , Sasha Levin Subject: [PATCH 6.6 065/508] net: hamradio: 6pack: fix uninit-value in sixpack_receive_buf Date: Wed, 20 May 2026 18:18:08 +0200 Message-ID: <20260520162100.011275354@linuxfoundation.org> X-Mailer: git-send-email 2.54.0 In-Reply-To: <20260520162058.573354582@linuxfoundation.org> References: <20260520162058.573354582@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.6-stable review patch. If anyone has any objections, please let me know. ------------------ From: Mashiro Chen [ Upstream commit bf9a38803b2626b01cc769aaf13485d8650f576f ] sixpack_receive_buf() does not properly skip bytes with TTY error flags. The while loop iterates through the flags buffer but never advances the data pointer (cp), and passes the original count (including error bytes) to sixpack_decode(). This causes sixpack_decode() to process bytes that should have been skipped due to TTY errors. The TTY layer does not guarantee that cp[i] holds a meaningful value when fp[i] is set, so passing those positions to sixpack_decode() results in KMSAN reporting an uninit-value read. Fix this by processing bytes one at a time, advancing cp on each iteration, and only passing valid (non-error) bytes to sixpack_decode(). This matches the pattern used by slip_receive_buf() and mkiss_receive_buf() for the same purpose. Reported-by: syzbot+ecdb8c9878a81eb21e54@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=ecdb8c9878a81eb21e54 Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Signed-off-by: Mashiro Chen Reviewed-by: Simon Horman Link: https://patch.msgid.link/20260407173101.107352-1-mashiro.chen@mailbox.org Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/net/hamradio/6pack.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/drivers/net/hamradio/6pack.c b/drivers/net/hamradio/6pack.c index 3145dadf99290..1b8680923919d 100644 --- a/drivers/net/hamradio/6pack.c +++ b/drivers/net/hamradio/6pack.c @@ -397,7 +397,6 @@ static void sixpack_receive_buf(struct tty_struct *tty, const u8 *cp, const u8 *fp, size_t count) { struct sixpack *sp; - size_t count1; if (!count) return; @@ -407,16 +406,16 @@ static void sixpack_receive_buf(struct tty_struct *tty, const u8 *cp, return; /* Read the characters out of the buffer */ - count1 = count; - while (count) { - count--; + while (count--) { if (fp && *fp++) { if (!test_and_set_bit(SIXPF_ERROR, &sp->flags)) sp->dev->stats.rx_errors++; + cp++; continue; } + sixpack_decode(sp, cp, 1); + cp++; } - sixpack_decode(sp, cp, count1); tty_unthrottle(tty); } -- 2.53.0