From: syzbot <syzbot+5dd615f890ddada54057@syzkaller.appspotmail.com>
To: linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com
Subject: Forwarded: [PATCH] net: atm: lec: add pre_send validation to avoid uninitialized
Date: Sat, 06 Dec 2025 19:29:22 -0800 [thread overview]
Message-ID: <6934f492.a70a0220.38f243.003d.GAE@google.com> (raw)
In-Reply-To: <69298e9d.a70a0220.d98e3.013a.GAE@google.com>
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com.
***
Subject: [PATCH] net: atm: lec: add pre_send validation to avoid uninitialized
Author: dharanitharan725@gmail.com
#syz test
syzbot reported a KMSAN uninitialized-value crash caused by reading
fields from struct atmlec_msg before validating that the skb contains
enough linear data. A malformed short skb can cause lec_arp_update()
and other handlers to access uninitialized memory.
Add a pre_send() validator that ensures the message header and optional
TLVs are fully present. This prevents all lec message types from reading
beyond initialized skb data.
Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Reported-by: syzbot+5dd615f890ddada54057@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=5dd615f890ddada54057
Signed-off-by: Dharanitharan R <dharanitharan725@gmail.com>
---
net/atm/lec.c | 25 +++++++++++++++++++++++++
1 file changed, 25 insertions(+)
diff --git a/net/atm/lec.c b/net/atm/lec.c
index afb8d3eb2185..c893781a490a 100644
--- a/net/atm/lec.c
+++ b/net/atm/lec.c
@@ -489,8 +489,33 @@ static void lec_atm_close(struct atm_vcc *vcc)
module_put(THIS_MODULE);
}
+static int lec_atm_pre_send(struct atm_vcc *vcc, struct sk_buff *skb)
+{
+ struct atmlec_msg *mesg;
+ u32 sizeoftlvs;
+ unsigned int msg_size = sizeof(struct atmlec_msg);
+
+ /* Must contain the base message */
+ if (skb->len < msg_size)
+ return -EINVAL;
+
+ /* Must have at least msg_size bytes in linear data */
+ if (!pskb_may_pull(skb, msg_size))
+ return -EINVAL;
+
+ mesg = (struct atmlec_msg *)skb->data;
+ sizeoftlvs = mesg->sizeoftlvs;
+
+ /* Validate TLVs if present */
+ if (sizeoftlvs && !pskb_may_pull(skb, msg_size + sizeoftlvs))
+ return -EINVAL;
+
+ return 0;
+}
+
static const struct atmdev_ops lecdev_ops = {
.close = lec_atm_close,
+ .pre_send = lec_atm_pre_send,
.send = lec_atm_send
};
--
2.43.0
prev parent reply other threads:[~2025-12-07 3:29 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-28 11:59 [syzbot] [net?] KMSAN: uninit-value in lec_atm_send syzbot
2025-11-28 15:56 ` [PATCH] net: atm: targetless need more input msg Edward Adam Davis
2025-11-30 15:56 ` Simon Horman
2025-12-01 1:35 ` Edward Adam Davis
2025-12-01 4:31 ` [PATCH net v2] net: atm: implement pre_send to check input before sending Edward Adam Davis
2025-12-04 10:35 ` Paolo Abeni
2025-12-04 10:26 ` [PATCH] net: atm: targetless need more input msg Paolo Abeni
2025-12-07 3:29 ` syzbot [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=6934f492.a70a0220.38f243.003d.GAE@google.com \
--to=syzbot+5dd615f890ddada54057@syzkaller.appspotmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=syzkaller-bugs@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox