From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-yx1-f43.google.com (mail-yx1-f43.google.com [74.125.224.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6FBEF37FF5B for ; Wed, 20 May 2026 21:22:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.224.43 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779312166; cv=none; b=DGar/9ziXTz1wgy0ZqgJVug1nkkrEnxgzVWUPg3Cl5ii+Fxz0/HGzIbML44C4LSTyiyvcwL0MRf4teh/dC5AE0tuswyq52sHX8WrpkL0cXlZ9L8tJMnhiKSDP5NUysvpcVDYEAxVBQkDOxZtjHy/NX7GqiULwxjkUOIN+38/mSI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779312166; c=relaxed/simple; bh=KRHFm91BkHusMuCr++lqPfMPZLI+rXaXJEU0fHom4mQ=; h=Date:From:To:Cc:Message-ID:In-Reply-To:References:Subject: Mime-Version:Content-Type; b=H+QsCIbi2HXbuvEsQFvwuSmSWFfneysVK+UqzBSyZ6EWP0VKGcFIy4ifCl2tJrxprxyqfjgP2Khgknthcx6IN99e3XBamS5qyAsQBKk9fGgY4ykRD2mf6CTgVBVX1V34haZVyCMRIwCuBIt+38BoqE6LaLxUG0l0d5WDZiOBMjE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=QatC0i0M; arc=none smtp.client-ip=74.125.224.43 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="QatC0i0M" Received: by mail-yx1-f43.google.com with SMTP id 956f58d0204a3-65c7492a2ceso4736632d50.3 for ; Wed, 20 May 2026 14:22:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1779312162; x=1779916962; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date:from:to:cc:subject:date :message-id:reply-to; bh=mEAw/HLd2Gukf+rbP9FYe175TBnZFF3s9mDfNnhekAY=; b=QatC0i0MBfL7me6hBc6CEWs1B7tcbGJbNzngGdQTwqEwcX4V0uIoWHyXDZjbioM3rd bkJQfASH+AUp47JfhpMVyZbR44Ue++0hyOwV1fFgmXSrSMC6rY8XQPraGyQ5TEoVOOD1 Nu5u8y18Eos4Ru5S/2S9FiacZgOI8eLBmWU8e8IAoWdWaidCNHHBuzJ7p4O0QMLjMiuu uXLI1CEDTu9ZnziYXRN2SiH5d3nwIEfCI1mrXlZcdaQqfMt+jKTT4RibKD3YGPwjtLdZ l4u9zgvKmrE1QquBfH0n3KpsgQAGee3GDRxa3q/EFdc+C7JIzHiWJfRmvH+dwU38Nul7 673w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779312162; x=1779916962; h=content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date:x-gm-gg:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=mEAw/HLd2Gukf+rbP9FYe175TBnZFF3s9mDfNnhekAY=; b=Ss6GFXHjOb2E8DHPqanWqTlBwqjU+Yi/dzzMCjRmy82wn7JDUmY4I/za59APgS61Ht gOtmgQo8hoMFgZiO27Y8xfU9bxniTSI1PUmxyBGC7+J/4JABCtXFlDJzsGqM66+xkJgZ dw09WZpJsHTGMOytlP7oSWfGQXiRMuoExtqxBYxAKXcL2LOFg3IEi2ekcUJEiZzFlsfZ hbXSNtgWzbEyTsA5KsJKSVcPID5OMbX+NN4so/B+eXzj+e3+BtQC8rqYVa/ZhGnPUPhZ /hZxljcIKHEPRlGRNLE+00MCxDjZQBVDzsAwEHeMXi1301nLyWiuHAAjLgEcuC9/aKP+ YYwA== X-Forwarded-Encrypted: i=1; AFNElJ/3n5uIJBW+FsFe4uhebY8kszuim0aJO1ME7lN3jhC49UamQJg/0Vrd/tTrEbNfYZUB08cWuM4=@vger.kernel.org X-Gm-Message-State: AOJu0YwbcsRnKiC/8mdV9qy9jRCGFCWVsDFJJN1YUcCrh+Cm6XaM4LNu xra8VkoUEzVTanHSNghSbGsGGY1rJCq7+QifwdfJbjOn2ybG6ctuoAv3wJnTOg== X-Gm-Gg: Acq92OEXkJB+rk7t/1LfTSMW2k4b79eRd0rtj9RowOp3QBtjVw6wp7IglMOOsxC073L gLSEAQq53PQYi7H79U2S3eeHBQcLBFbTwEFK8eNqp4yInotEs1Cw3vdG5f+Dodo9gJyQ5lhkldq kMlbuypowGJ6xwEFLcGpOLkeL46kpawBEJX7UGnfXli+DIiuRHuxibd3ewqDTDeR7tLewoGvDfz DebcvOYFDIYP53793egA7xP/39mgh/ArFvbsG6RztIDoFG6Zyta25vGykuIYSiIMfVCoTqpz7Nf zpuJsxgs9kRK2ouvctU3yUmmud1sAKRGVg+BgESNfanciAznl3eInSLrGhtqctcG0fWFQMLSZ+g /Jg9avUCSnNZfSAYgoUNMeV7hSamZvbXTdOWErWylq/t1O41p5HWuUbTm09Yl6co3ws81r4T7iY pqZt0KbHP5yFxgSvRkkGSWLkwlHcOr3efYr+41eZg+gDs89TYMDH6lAImV8RxUXRcuR5bXiEOns BEv X-Received: by 2002:a05:690c:b88:b0:7c7:5111:5f05 with SMTP id 00721157ae682-7d20d123e00mr2059477b3.48.1779312162633; Wed, 20 May 2026 14:22:42 -0700 (PDT) Received: from gmail.com (172.235.85.34.bc.googleusercontent.com. [34.85.235.172]) by smtp.gmail.com with ESMTPSA id 00721157ae682-7cc996b7d54sm57824987b3.12.2026.05.20.14.22.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 14:22:41 -0700 (PDT) Date: Wed, 20 May 2026 17:22:41 -0400 From: Willem de Bruijn To: Weiming Shi , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: willemdebruijn.kernel@gmail.com, jasowang@redhat.com, andrew+netdev@lunn.ch, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, cong.wang@bytedance.com, stable@vger.kernel.org, xmei5@asu.edu, Weiming Shi Message-ID: In-Reply-To: <20260520075736.3415676-3-bestswngs@gmail.com> References: <20260520075736.3415676-3-bestswngs@gmail.com> Subject: Re: [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Weiming Shi wrote: > In the SIOCGIFHWADDR path, tap_ioctl() copies 16 bytes of an > uninitialised on-stack struct sockaddr_storage to userspace via > ifr_hwaddr, but netif_get_mac_address() only writes sa_family and > dev->addr_len (6 for Ethernet) bytes, leaving sa_data[6..13] uninitialised. > > Those 8 trailing bytes leak kernel stack contents; SIOCGIFHWADDR on a > macvtap chardev returns kernel .text and direct-map pointers, defeating > KASLR. > > Initialise ss at declaration. > > Fixes: 3b23a32a6321 ("net: fix dev_ifsioc_locked() race condition") > Reported-by: Xiang Mei > Assisted-by: Claude:claude-opus-4-7 > Signed-off-by: Weiming Shi Reviewed-by: Willem de Bruijn