Netdev List
 help / color / mirror / Atom feed
* [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR
@ 2026-05-20  7:57 Weiming Shi
  2026-05-20 21:22 ` Willem de Bruijn
  2026-05-21 15:20 ` patchwork-bot+netdevbpf
  0 siblings, 2 replies; 4+ messages in thread
From: Weiming Shi @ 2026-05-20  7:57 UTC (permalink / raw)
  To: netdev, linux-kernel
  Cc: willemdebruijn.kernel, jasowang, andrew+netdev, davem, edumazet,
	kuba, pabeni, cong.wang, stable, xmei5, Weiming Shi

In the SIOCGIFHWADDR path, tap_ioctl() copies 16 bytes of an
uninitialised on-stack struct sockaddr_storage to userspace via
ifr_hwaddr, but netif_get_mac_address() only writes sa_family and
dev->addr_len (6 for Ethernet) bytes, leaving sa_data[6..13] uninitialised.

Those 8 trailing bytes leak kernel stack contents; SIOCGIFHWADDR on a
macvtap chardev returns kernel .text and direct-map pointers, defeating
KASLR.

Initialise ss at declaration.

Fixes: 3b23a32a6321 ("net: fix dev_ifsioc_locked() race condition")
Reported-by: Xiang Mei <xmei5@asu.edu>
Assisted-by: Claude:claude-opus-4-7
Signed-off-by: Weiming Shi <bestswngs@gmail.com>
---
 drivers/net/tap.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/net/tap.c b/drivers/net/tap.c
index b8240737dc51..e1522101b9e4 100644
--- a/drivers/net/tap.c
+++ b/drivers/net/tap.c
@@ -923,7 +923,7 @@ static long tap_ioctl(struct file *file, unsigned int cmd,
 	unsigned int __user *up = argp;
 	unsigned short u;
 	int __user *sp = argp;
-	struct sockaddr_storage ss;
+	struct sockaddr_storage ss = {};
 	int s;
 	int ret;
 
-- 
2.43.0


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR
  2026-05-20  7:57 [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR Weiming Shi
@ 2026-05-20 21:22 ` Willem de Bruijn
  2026-05-20 21:30   ` Willem de Bruijn
  2026-05-21 15:20 ` patchwork-bot+netdevbpf
  1 sibling, 1 reply; 4+ messages in thread
From: Willem de Bruijn @ 2026-05-20 21:22 UTC (permalink / raw)
  To: Weiming Shi, netdev, linux-kernel
  Cc: willemdebruijn.kernel, jasowang, andrew+netdev, davem, edumazet,
	kuba, pabeni, cong.wang, stable, xmei5, Weiming Shi

Weiming Shi wrote:
> In the SIOCGIFHWADDR path, tap_ioctl() copies 16 bytes of an
> uninitialised on-stack struct sockaddr_storage to userspace via
> ifr_hwaddr, but netif_get_mac_address() only writes sa_family and
> dev->addr_len (6 for Ethernet) bytes, leaving sa_data[6..13] uninitialised.
> 
> Those 8 trailing bytes leak kernel stack contents; SIOCGIFHWADDR on a
> macvtap chardev returns kernel .text and direct-map pointers, defeating
> KASLR.
> 
> Initialise ss at declaration.
> 
> Fixes: 3b23a32a6321 ("net: fix dev_ifsioc_locked() race condition")
> Reported-by: Xiang Mei <xmei5@asu.edu>
> Assisted-by: Claude:claude-opus-4-7
> Signed-off-by: Weiming Shi <bestswngs@gmail.com>

Reviewed-by: Willem de Bruijn <willemb@google.com>


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR
  2026-05-20 21:22 ` Willem de Bruijn
@ 2026-05-20 21:30   ` Willem de Bruijn
  0 siblings, 0 replies; 4+ messages in thread
From: Willem de Bruijn @ 2026-05-20 21:30 UTC (permalink / raw)
  To: Willem de Bruijn, Weiming Shi, netdev, linux-kernel
  Cc: willemdebruijn.kernel, jasowang, andrew+netdev, davem, edumazet,
	kuba, pabeni, cong.wang, stable, xmei5, Weiming Shi

Willem de Bruijn wrote:
> Weiming Shi wrote:
> > In the SIOCGIFHWADDR path, tap_ioctl() copies 16 bytes of an
> > uninitialised on-stack struct sockaddr_storage to userspace via
> > ifr_hwaddr, but netif_get_mac_address() only writes sa_family and
> > dev->addr_len (6 for Ethernet) bytes, leaving sa_data[6..13] uninitialised.
> > 
> > Those 8 trailing bytes leak kernel stack contents; SIOCGIFHWADDR on a
> > macvtap chardev returns kernel .text and direct-map pointers, defeating
> > KASLR.
> > 
> > Initialise ss at declaration.
> > 
> > Fixes: 3b23a32a6321 ("net: fix dev_ifsioc_locked() race condition")
> > Reported-by: Xiang Mei <xmei5@asu.edu>
> > Assisted-by: Claude:claude-opus-4-7
> > Signed-off-by: Weiming Shi <bestswngs@gmail.com>
> 
> Reviewed-by: Willem de Bruijn <willemb@google.com>

But it should target [PATCH net] and

Cc: Stable@vger.kernel.org



^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR
  2026-05-20  7:57 [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR Weiming Shi
  2026-05-20 21:22 ` Willem de Bruijn
@ 2026-05-21 15:20 ` patchwork-bot+netdevbpf
  1 sibling, 0 replies; 4+ messages in thread
From: patchwork-bot+netdevbpf @ 2026-05-21 15:20 UTC (permalink / raw)
  To: Weiming Shi
  Cc: netdev, linux-kernel, willemdebruijn.kernel, jasowang,
	andrew+netdev, davem, edumazet, kuba, pabeni, cong.wang, stable,
	xmei5

Hello:

This patch was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:

On Wed, 20 May 2026 00:57:38 -0700 you wrote:
> In the SIOCGIFHWADDR path, tap_ioctl() copies 16 bytes of an
> uninitialised on-stack struct sockaddr_storage to userspace via
> ifr_hwaddr, but netif_get_mac_address() only writes sa_family and
> dev->addr_len (6 for Ethernet) bytes, leaving sa_data[6..13] uninitialised.
> 
> Those 8 trailing bytes leak kernel stack contents; SIOCGIFHWADDR on a
> macvtap chardev returns kernel .text and direct-map pointers, defeating
> KASLR.
> 
> [...]

Here is the summary with links:
  - tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR
    https://git.kernel.org/netdev/net/c/bddc09212c24

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2026-05-21 15:20 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-05-20  7:57 [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR Weiming Shi
2026-05-20 21:22 ` Willem de Bruijn
2026-05-20 21:30   ` Willem de Bruijn
2026-05-21 15:20 ` patchwork-bot+netdevbpf

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox