Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752641AbZFGXLX (ORCPT ); Sun, 7 Jun 2009 19:11:23 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750955AbZFGXLL (ORCPT ); Sun, 7 Jun 2009 19:11:11 -0400 Received: from mail.vyatta.com ([76.74.103.46]:56239 "EHLO mail.vyatta.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750753AbZFGXLJ (ORCPT ); Sun, 7 Jun 2009 19:11:09 -0400 Date: Sun, 7 Jun 2009 16:11:05 -0700 From: Stephen Hemminger To: Vegard Nossum Cc: Linux Netdev List , Ingo Molnar , Pekka Enberg , LKML Subject: Re: net: uninitialized loopback addr leaks to userspace Message-ID: <20090607161105.385d6e92@nehalam> In-Reply-To: <19f34abd0905301323k1498ca3fv31b271de65d60afc@mail.gmail.com> References: <19f34abd0905301323k1498ca3fv31b271de65d60afc@mail.gmail.com> Organization: Vyatta X-Mailer: Claws Mail 3.6.1 (GTK+ 2.16.1; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2335 Lines: 52 On Sat, 30 May 2009 22:23:24 +0200 Vegard Nossum wrote: > Hi, > > It seems that loopback's hardware address is never initialized by the > kernel. So if userspace attempts to read this address before it has > been set, the kernel will return some uninitialized data (only 6 > bytes, though). This can be demonstrated by creating a new network > namespace (CLONE_NEWNET), which creates a new loopback device, then > call ioctl() with SIOCGIFHWADDR on "lo". If this is done in a loop, > with some background load, or by running multiple instances, random > data will start to show up in the returned address. > > [ 406.750329] WARNING: kmemcheck: Caught 16-bit read from > uninitialized memory (ffff880007220974) > [ 406.753555] 18a2d7060088ffff18a2d7060088ffff00000000010000000100000003000000 > [ 406.758862] i i i i i i i i i i i i i i i i i u u u u u u u u u u u u u u u > [ 406.766224] ^ > [ 406.768792] Modules linked in: > [ 406.770416] Pid: 757, comm: ifconfig Not tainted > 2.6.30-rc7-next-20090529 #404 > [ 406.772876] RIP: 0010:[] [] > dev_ioctl+0x5d9/0x600 > [ 406.804677] [] sock_ioctl+0x95/0x2a0 > [ 406.807242] [] vfs_ioctl+0x1b/0x70 > [ 406.809348] [] do_vfs_ioctl+0x8a/0x570 > [ 406.811419] [] sys_ioctl+0x99/0xa0 > [ 406.813400] [] dev_ifsioc+0x81/0x2f0 > [ 406.815424] [] compat_sys_ioctl+0xed/0x3c0 > [ 406.817596] [] cstar_dispatch+0x7/0x26 > [ 406.819978] [] 0xffffffffffffffff > > This is the code that triggers the warning, in net/core/dev.c, around line 4150: > > memcpy(ifr->ifr_hwaddr.sa_data, dev->dev_addr, > min(sizeof ifr->ifr_hwaddr.sa_data, (size_t) dev->addr_len)); > > So it's dev->dev_addr that is the pointer to the uninitialized data. > > I didn't know how to fix it. > The whole dev structure is zeroed in alloc_netdev(), kmemcheck is giving bogus warning. -- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/