From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-alma10-1.taild15c8.ts.net [100.103.45.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 54C2B3EF0A1; Wed, 20 May 2026 16:33:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=100.103.45.18 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779294817; cv=none; b=F/ggcMr95VkIGcTn2RzlQjqi7O8LcZc6hSW+YKkGnfdi/+HFQObMgGLeFPJZrwkWPSeJojEygrFCzV/CxtpvHaQC3ywBATLl9ID4EKQIU5XFEoi/yrZNZNYz1QJ6TV95bj8FQmRd0+U/DPEToYPRR2xUkAiK2n9PlYgifcovhFk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779294817; c=relaxed/simple; bh=vJ7R4lufKorvsk1jaXn+CPNokhXSkYqXLxFlbjojWcU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=h5v9EtKvybOS+J7+HwReFopspQPrxB7FRQc4GNkXM34BWj4O0YE8+fdX5B5xo+vaf/QHG9UAMT2w4+iOcsQKPbqXXvGeDK0+0TNaQPfIBnmBq/OxistgMg1uyk2FaR935Su5TaW8gEXRsFHe6+X1l0jN0+rQ7o31M+6JjkfDl1A= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=HkWAGOIu; arc=none smtp.client-ip=100.103.45.18 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="HkWAGOIu" Received: by smtp.kernel.org (Postfix) with ESMTPSA id BA9541F00893; Wed, 20 May 2026 16:33:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=korg; t=1779294816; bh=QJDq0BeMy46B00qBdC4HWcGCjoEYxNdZji06r+MFpgg=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=HkWAGOIuuETOodo6ABqLqSdQ6wUPKvwC6B0Er14VyP/7WCpBBVDKYJeDaQ7SRnQ9B Felppkz3uBy/yZKwpi5YVSu9L884AI71gvkOA2mMC/49LU1hRCgmT8n/ALLR77uaPe JYocSc/A1Y+y6HP3GZwvXk4BMQJaunPY7xk0xvDE= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, syzbot+ecdb8c9878a81eb21e54@syzkaller.appspotmail.com, Mashiro Chen , Simon Horman , Jakub Kicinski , Sasha Levin Subject: [PATCH 7.0 0184/1146] net: hamradio: 6pack: fix uninit-value in sixpack_receive_buf Date: Wed, 20 May 2026 18:07:14 +0200 Message-ID: <20260520162152.443628926@linuxfoundation.org> X-Mailer: git-send-email 2.54.0 In-Reply-To: <20260520162148.390695140@linuxfoundation.org> References: <20260520162148.390695140@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 7.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Mashiro Chen [ Upstream commit bf9a38803b2626b01cc769aaf13485d8650f576f ] sixpack_receive_buf() does not properly skip bytes with TTY error flags. The while loop iterates through the flags buffer but never advances the data pointer (cp), and passes the original count (including error bytes) to sixpack_decode(). This causes sixpack_decode() to process bytes that should have been skipped due to TTY errors. The TTY layer does not guarantee that cp[i] holds a meaningful value when fp[i] is set, so passing those positions to sixpack_decode() results in KMSAN reporting an uninit-value read. Fix this by processing bytes one at a time, advancing cp on each iteration, and only passing valid (non-error) bytes to sixpack_decode(). This matches the pattern used by slip_receive_buf() and mkiss_receive_buf() for the same purpose. Reported-by: syzbot+ecdb8c9878a81eb21e54@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=ecdb8c9878a81eb21e54 Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Signed-off-by: Mashiro Chen Reviewed-by: Simon Horman Link: https://patch.msgid.link/20260407173101.107352-1-mashiro.chen@mailbox.org Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/net/hamradio/6pack.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/drivers/net/hamradio/6pack.c b/drivers/net/hamradio/6pack.c index 885992951e8a6..c8b2dc5c1becc 100644 --- a/drivers/net/hamradio/6pack.c +++ b/drivers/net/hamradio/6pack.c @@ -391,7 +391,6 @@ static void sixpack_receive_buf(struct tty_struct *tty, const u8 *cp, const u8 *fp, size_t count) { struct sixpack *sp; - size_t count1; if (!count) return; @@ -401,16 +400,16 @@ static void sixpack_receive_buf(struct tty_struct *tty, const u8 *cp, return; /* Read the characters out of the buffer */ - count1 = count; - while (count) { - count--; + while (count--) { if (fp && *fp++) { if (!test_and_set_bit(SIXPF_ERROR, &sp->flags)) sp->dev->stats.rx_errors++; + cp++; continue; } + sixpack_decode(sp, cp, 1); + cp++; } - sixpack_decode(sp, cp, count1); tty_unthrottle(tty); } -- 2.53.0