{"id":2231660,"url":"http://patchwork.ozlabs.org/api/patches/2231660/?format=json","web_url":"http://patchwork.ozlabs.org/project/linuxppc-dev/patch/7bfe03b65a282c856ed8182d1871bb973c0b78f2.1777606826.git.ritesh.list@gmail.com/","project":{"id":2,"url":"http://patchwork.ozlabs.org/api/projects/2/?format=json","name":"Linux PPC development","link_name":"linuxppc-dev","list_id":"linuxppc-dev.lists.ozlabs.org","list_email":"linuxppc-dev@lists.ozlabs.org","web_url":"https://github.com/linuxppc/wiki/wiki","scm_url":"https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git","webscm_url":"https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/","list_archive_url":"https://lore.kernel.org/linuxppc-dev/","list_archive_url_format":"https://lore.kernel.org/linuxppc-dev/{}/","commit_url_format":"https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}"},"msgid":"<7bfe03b65a282c856ed8182d1871bb973c0b78f2.1777606826.git.ritesh.list@gmail.com>","list_archive_url":"https://lore.kernel.org/linuxppc-dev/7bfe03b65a282c856ed8182d1871bb973c0b78f2.1777606826.git.ritesh.list@gmail.com/","date":"2026-05-01T04:11:41","name":"[v3,2/9] pseries/papr-hvpipe: Prevent kernel stack memory leak to userspace","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"fcfbfea92e7db62ca634e78d45abd49af1bc7c4a","submitter":{"id":79126,"url":"http://patchwork.ozlabs.org/api/people/79126/?format=json","name":"Ritesh Harjani (IBM)","email":"ritesh.list@gmail.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/linuxppc-dev/patch/7bfe03b65a282c856ed8182d1871bb973c0b78f2.1777606826.git.ritesh.list@gmail.com/mbox/","series":[{"id":502420,"url":"http://patchwork.ozlabs.org/api/series/502420/?format=json","web_url":"http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=502420","date":"2026-05-01T04:11:39","name":"pseries/papr-hvpipe: Fix deadlock, races and misc cleanups","version":3,"mbox":"http://patchwork.ozlabs.org/series/502420/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2231660/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2231660/checks/","tags":{},"related":[],"headers":{"Return-Path":"\n <linuxppc-dev+bounces-20353-incoming=patchwork.ozlabs.org@lists.ozlabs.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linuxppc-dev@lists.ozlabs.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=euXBAH2l;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-20353-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)","lists.ozlabs.org;\n arc=none smtp.remote-ip=\"2607:f8b0:4864:20::42c\"","lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com","lists.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=euXBAH2l;\n\tdkim-atps=neutral","lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gmail.com\n (client-ip=2607:f8b0:4864:20::42c; helo=mail-pf1-x42c.google.com;\n envelope-from=ritesh.list@gmail.com; receiver=lists.ozlabs.org)"],"Received":["from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g6Hgq2zR2z1y04\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 01 May 2026 14:12:39 +1000 (AEST)","from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4g6HgZ6bMqz30V2;\n\tFri, 01 May 2026 14:12:26 +1000 (AEST)","from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com\n [IPv6:2607:f8b0:4864:20::42c])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4g6HgZ1jtRz2xjd\n\tfor <linuxppc-dev@lists.ozlabs.org>; Fri, 01 May 2026 14:12:26 +1000 (AEST)","by mail-pf1-x42c.google.com with SMTP id\n d2e1a72fcca58-8296d553142so1110686b3a.3\n        for <linuxppc-dev@lists.ozlabs.org>;\n Thu, 30 Apr 2026 21:12:26 -0700 (PDT)","from localhost.localdomain ([49.205.216.49])\n        by smtp.gmail.com with ESMTPSA id\n d2e1a72fcca58-83515b485eesm1159428b3a.48.2026.04.30.21.12.19\n        (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);\n        Thu, 30 Apr 2026 21:12:22 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1777608746;\n\tcv=none;\n b=G4GpEAijLzDOzQqX8PoKKdjo4XfeQDzPDGDL0i6i+U3oqJiyBArV7IwiXyRdAS4EJuOZufnRlsJXAmYNSRvEWjlNYkJGoZ1e5P2cAvC+osC8opKAI8JyfUSWxr0oqCGqp9M0Y+gvD5W2K4JjdUmSE2kdLJvmPSDFAHj+4BuW7MAdXvruzMZCWMUgJL7C5L36fXy0+rK+U7JKJLbx5SdnfAeCmiLvUyZzJ4ufNKGvaRYqqEwQF9Oo9yBgAuKKwtMC4uFGQEcHymqiBWPpJRSWe9xuSAVDiXybz+VrQydNdmKA77HvlbZ8pTYassoKn+ZMLY9ZzOrO8DuftblHfZAbWQ==","ARC-Message-Signature":"i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1777608746; c=relaxed/relaxed;\n\tbh=t0UuqUvbVXxe7PO3IdsW6Ps33YC23onFgbsbMbzoM7M=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version;\n b=GYC6WKPxXrqX6UDNyQaOtbIbWsXWLLh6414+tuOMbiEZ1tx+UGgQ2IunR/MA8NVOwEYoFGT5dIVlgmQkyHpMmsM0P/XcNduZO1tDpcgj3/289lwf6htRhUmv4xeLukeOJK0l3mB/+P2d6/FaAjjvRl1XKrCiS7RbIgVOqX3b777/JTCGsfLFRLIIT/FTFuloxiA5mMsXxRNHyHHhWMU5hLeF2kdmPwP0+HCdEbFZB8NFP9EMVxlMcqn5DPirr0evWeeyMFvMCyyuHhkPRjMYgmDtr/2jKS5h4r7iK7ghoCyQnKDd1WO+qUENgko+80vFIB2vqWaQrbM4eZq6fD7ztQ==","ARC-Authentication-Results":"i=1; lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com; dkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=euXBAH2l; dkim-atps=neutral;\n spf=pass (client-ip=2607:f8b0:4864:20::42c; helo=mail-pf1-x42c.google.com;\n envelope-from=ritesh.list@gmail.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=gmail.com","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=gmail.com; s=20251104; t=1777608744; x=1778213544;\n darn=lists.ozlabs.org;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=t0UuqUvbVXxe7PO3IdsW6Ps33YC23onFgbsbMbzoM7M=;\n        b=euXBAH2l2/JuvrfRBFulSFV2s32PGA/7LvZ9e8A35jqABi/cOktcmmobZ/60GUz0z6\n         VDDEYmw0120rpNxULifRqG5Za5Rh1TWCO/7e3Hi+MQO6j4EeRUq39A7e6kyMzBkyU8pW\n         ouJCw9bz7EBsIg7eZZYgAV4+xf3JwB1OCJLX36j52Knh7jgSqDgIQhqxFGmTyZFUNT4X\n         QzFe+j468mnzrmBUSEYg2swDTBERTfo4A17L/MxuMuKMOr8Udkal2k/szw8hMkA6ee8a\n         A9FrI2eYOQGKuxq/xNdTEV+33By6MsPDA7bDG/DDeERDOD4zIpgbKSXL65YyMZVi/XyH\n         zAGg==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1777608744; x=1778213544;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=t0UuqUvbVXxe7PO3IdsW6Ps33YC23onFgbsbMbzoM7M=;\n        b=DykDuy03VP1EglndlqjNaz2lcXYH/CtN2wOeqUbJtc87o7uQHobkm8+fquzFtvcG9I\n         0VzlZE9jxpKfwURTu+e2QjuC+lw0kJpcR7fQpVHcLzfrONl5WNq5eJhAtxBa/xtcJoKW\n         bKF+kil9ed3LEBhP3S/ZUDvwiOH3fvMvo+Xz3iwCpmMEVkxPtdZNiTXI7Q8MTCBZOPhi\n         prVYYbnYD0sXvPxOMs5vW2qZyxWCFFEBf/lJw6Yh68sx4+Es8O8KH6n4LvgE98TIDSSC\n         Kx4yUFptOdFb615su6RScspo4Gb44qHQwsv30b3ZySxlmqG8XGLbKmlKdEO/xVWBWarR\n         M94g==","X-Gm-Message-State":"AOJu0YxYhcvhKYMrJ6kOvhL/3oOOvJwHDwXCXBwRJ82O0w4ld+SvcxfT\n\tEnlTNYV3tkOfawIK6ToSZ46naEnqEWzNJlQjgZpzvxK9lt0no+yflkY0IPjHCNVL","X-Gm-Gg":"AeBDieva5ozIhv7O9TFeJHux+LjFXpOhhMiSbuTQZpVwvY33ij3WAwoGygKFw2tEkgK\n\tWrOhH8PtRa7nHT6trTKEEPP4Y0msY+0l5fRsILpgM++IK9DU15Y/LNON53VhUHA3f3jhShb0AQI\n\t0raGVf2OQGCPlGzY63sBqnpPPJHURQFS27dTqRVWn1ewAswyP5X3MR8nbjQRLKhpT33P0VaxaWH\n\tuvmkhdKB/1Yd07mP9zA3gPw7/p8/aC9/N5mFWYLvYtPvoXMthDPPs2eex5569caKaZvh3VnPnke\n\teYT+YXUdyZ9IVcha1z2xsJzGLypNCbO7djkT1hRYTZMc/iU4yZwAtSySAZaIIN3h9V5un57X8ug\n\tmTKYl55fcRLf6JyonpxVdYQO9LJqBcnTmLw46hUHlC+xJ5q7tCe0QE95zrEQMbIc1d4MpfWxTfn\n\tedZaWxdsxYAYo1KWuJVcX3jByYoCtG6hT5tf30GJ+Q6ssn0FbFweypO2bG3ojx7kw=","X-Received":"by 2002:a05:6a00:181f:b0:82c:6b23:6d10 with SMTP id\n d2e1a72fcca58-834fdb58c54mr6377026b3a.3.1777608743787;\n        Thu, 30 Apr 2026 21:12:23 -0700 (PDT)","From":"\"Ritesh Harjani (IBM)\" <ritesh.list@gmail.com>","To":"linuxppc-dev@lists.ozlabs.org,\n\tHaren Myneni <haren@linux.ibm.com>","Cc":"Madhavan Srinivasan <maddy@linux.ibm.com>,\n\tChristophe Leroy <chleroy@kernel.org>,\n\tVenkat Rao Bagalkote <venkat88@linux.ibm.com>,\n\tNicholas Piggin <npiggin@gmail.com>,\n\tlinux-kernel@vger.kernel.org,\n\t\"Ritesh Harjani (IBM)\" <ritesh.list@gmail.com>,\n\tstable@vger.kernel.org","Subject":"[PATCH v3 2/9] pseries/papr-hvpipe: Prevent kernel stack memory leak\n to userspace","Date":"Fri,  1 May 2026 09:41:41 +0530","Message-ID":"\n <7bfe03b65a282c856ed8182d1871bb973c0b78f2.1777606826.git.ritesh.list@gmail.com>","X-Mailer":"git-send-email 2.50.1","In-Reply-To":"<cover.1777606826.git.ritesh.list@gmail.com>","References":"<cover.1777606826.git.ritesh.list@gmail.com>","X-Mailing-List":"linuxppc-dev@lists.ozlabs.org","List-Id":"<linuxppc-dev.lists.ozlabs.org>","List-Help":"<mailto:linuxppc-dev+help@lists.ozlabs.org>","List-Owner":"<mailto:linuxppc-dev+owner@lists.ozlabs.org>","List-Post":"<mailto:linuxppc-dev@lists.ozlabs.org>","List-Archive":"<https://lore.kernel.org/linuxppc-dev/>,\n  <https://lists.ozlabs.org/pipermail/linuxppc-dev/>","List-Subscribe":"<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>","List-Unsubscribe":"<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>","Precedence":"list","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","X-Spam-Status":"No, score=-0.2 required=3.0 tests=DKIM_SIGNED,DKIM_VALID,\n\tDKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,\n\tSPF_HELO_NONE,SPF_PASS autolearn=disabled version=4.0.1 OzLabs 8","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org"},"content":"The hdr variable is allocated on the stack and only hdr.version and\nhdr.flags are initialized explicitly. Because the struct papr_hvpipe_hdr\ncontains reserved padding bytes (reserved[3] and reserved2[40]), these\ncould leak the uninitialized bytes to userspace after copy_to_user().\n\nThis patch fixes that by initializing the whole struct to 0.\n\nCc: stable@vger.kernel.org\nFixes: cebdb522fd3ed (\"powerpc/pseries: Receive payload with ibm,receive-hvpipe-msg RTAS\")\nSigned-off-by: Ritesh Harjani (IBM) <ritesh.list@gmail.com>\n---\n arch/powerpc/platforms/pseries/papr-hvpipe.c | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)","diff":"diff --git a/arch/powerpc/platforms/pseries/papr-hvpipe.c b/arch/powerpc/platforms/pseries/papr-hvpipe.c\nindex c41d45e1986d..3392874ebdf6 100644\n--- a/arch/powerpc/platforms/pseries/papr-hvpipe.c\n+++ b/arch/powerpc/platforms/pseries/papr-hvpipe.c\n@@ -327,7 +327,7 @@ static ssize_t papr_hvpipe_handle_read(struct file *file,\n {\n \n \tstruct hvpipe_source_info *src_info = file->private_data;\n-\tstruct papr_hvpipe_hdr hdr;\n+\tstruct papr_hvpipe_hdr hdr = {};\n \tlong ret;\n \n \t/*\n","prefixes":["v3","2/9"]}