* [PATCH] vhost/vsock: always initialize seqpacket_allow
@ 2024-05-15 15:05 Michael S. Tsirkin
2024-05-16 5:03 ` Jason Wang
` (4 more replies)
0 siblings, 5 replies; 6+ messages in thread
From: Michael S. Tsirkin @ 2024-05-15 15:05 UTC (permalink / raw)
To: linux-kernel
Cc: syzbot+6c21aeb59d0e82eb2782, Jeongjun Park, Arseny Krasnov,
David S . Miller, Stefan Hajnoczi, Stefano Garzarella, Jason Wang,
Eugenio Pérez, kvm, virtualization, netdev
There are two issues around seqpacket_allow:
1. seqpacket_allow is not initialized when socket is
created. Thus if features are never set, it will be
read uninitialized.
2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
then seqpacket_allow will not be cleared appropriately
(existing apps I know about don't usually do this but
it's legal and there's no way to be sure no one relies
on this).
To fix:
- initialize seqpacket_allow after allocation
- set it unconditionally in set_features
Reported-by: syzbot+6c21aeb59d0e82eb2782@syzkaller.appspotmail.com
Reported-by: Jeongjun Park <aha310510@gmail.com>
Fixes: ced7b713711f ("vhost/vsock: support SEQPACKET for transport").
Cc: Arseny Krasnov <arseny.krasnov@kaspersky.com>
Cc: David S. Miller <davem@davemloft.net>
Cc: Stefan Hajnoczi <stefanha@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Acked-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
Tested-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
---
Reposting now it's been tested.
drivers/vhost/vsock.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c
index ec20ecff85c7..bf664ec9341b 100644
--- a/drivers/vhost/vsock.c
+++ b/drivers/vhost/vsock.c
@@ -667,6 +667,7 @@ static int vhost_vsock_dev_open(struct inode *inode, struct file *file)
}
vsock->guest_cid = 0; /* no CID assigned yet */
+ vsock->seqpacket_allow = false;
atomic_set(&vsock->queued_replies, 0);
@@ -810,8 +811,7 @@ static int vhost_vsock_set_features(struct vhost_vsock *vsock, u64 features)
goto err;
}
- if (features & (1ULL << VIRTIO_VSOCK_F_SEQPACKET))
- vsock->seqpacket_allow = true;
+ vsock->seqpacket_allow = features & (1ULL << VIRTIO_VSOCK_F_SEQPACKET);
for (i = 0; i < ARRAY_SIZE(vsock->vqs); i++) {
vq = &vsock->vqs[i];
--
MST
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
2024-05-15 15:05 [PATCH] vhost/vsock: always initialize seqpacket_allow Michael S. Tsirkin
@ 2024-05-16 5:03 ` Jason Wang
2024-05-16 8:09 ` Stefano Garzarella
` (3 subsequent siblings)
4 siblings, 0 replies; 6+ messages in thread
From: Jason Wang @ 2024-05-16 5:03 UTC (permalink / raw)
To: Michael S. Tsirkin
Cc: linux-kernel, syzbot+6c21aeb59d0e82eb2782, Jeongjun Park,
Arseny Krasnov, David S . Miller, Stefan Hajnoczi,
Stefano Garzarella, Eugenio Pérez, kvm, virtualization,
netdev
On Wed, May 15, 2024 at 11:05 PM Michael S. Tsirkin <mst@redhat.com> wrote:
>
> There are two issues around seqpacket_allow:
> 1. seqpacket_allow is not initialized when socket is
> created. Thus if features are never set, it will be
> read uninitialized.
> 2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
> then seqpacket_allow will not be cleared appropriately
> (existing apps I know about don't usually do this but
> it's legal and there's no way to be sure no one relies
> on this).
>
> To fix:
> - initialize seqpacket_allow after allocation
> - set it unconditionally in set_features
>
> Reported-by: syzbot+6c21aeb59d0e82eb2782@syzkaller.appspotmail.com
> Reported-by: Jeongjun Park <aha310510@gmail.com>
> Fixes: ced7b713711f ("vhost/vsock: support SEQPACKET for transport").
> Cc: Arseny Krasnov <arseny.krasnov@kaspersky.com>
> Cc: David S. Miller <davem@davemloft.net>
> Cc: Stefan Hajnoczi <stefanha@redhat.com>
> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
> Acked-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
> Tested-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
>
Acked-by: Jason Wang <jasowang@redhat.com>
Thanks
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
2024-05-15 15:05 [PATCH] vhost/vsock: always initialize seqpacket_allow Michael S. Tsirkin
2024-05-16 5:03 ` Jason Wang
@ 2024-05-16 8:09 ` Stefano Garzarella
2024-05-16 13:37 ` Eugenio Perez Martin
` (2 subsequent siblings)
4 siblings, 0 replies; 6+ messages in thread
From: Stefano Garzarella @ 2024-05-16 8:09 UTC (permalink / raw)
To: Michael S. Tsirkin
Cc: linux-kernel, syzbot+6c21aeb59d0e82eb2782, Jeongjun Park,
Arseny Krasnov, David S . Miller, Stefan Hajnoczi, Jason Wang,
Eugenio Pérez, kvm, virtualization, netdev
On Wed, May 15, 2024 at 11:05:43AM GMT, Michael S. Tsirkin wrote:
>There are two issues around seqpacket_allow:
>1. seqpacket_allow is not initialized when socket is
> created. Thus if features are never set, it will be
> read uninitialized.
>2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
> then seqpacket_allow will not be cleared appropriately
> (existing apps I know about don't usually do this but
> it's legal and there's no way to be sure no one relies
> on this).
>
>To fix:
> - initialize seqpacket_allow after allocation
> - set it unconditionally in set_features
>
>Reported-by: syzbot+6c21aeb59d0e82eb2782@syzkaller.appspotmail.com
>Reported-by: Jeongjun Park <aha310510@gmail.com>
>Fixes: ced7b713711f ("vhost/vsock: support SEQPACKET for transport").
>Cc: Arseny Krasnov <arseny.krasnov@kaspersky.com>
>Cc: David S. Miller <davem@davemloft.net>
>Cc: Stefan Hajnoczi <stefanha@redhat.com>
>Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
>Acked-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
>Tested-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
>
>---
>
>
>Reposting now it's been tested.
>
> drivers/vhost/vsock.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
Thanks for fixing this issue!
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
2024-05-15 15:05 [PATCH] vhost/vsock: always initialize seqpacket_allow Michael S. Tsirkin
2024-05-16 5:03 ` Jason Wang
2024-05-16 8:09 ` Stefano Garzarella
@ 2024-05-16 13:37 ` Eugenio Perez Martin
2024-05-17 2:37 ` Jakub Kicinski
2024-06-27 3:37 ` 박정준
4 siblings, 0 replies; 6+ messages in thread
From: Eugenio Perez Martin @ 2024-05-16 13:37 UTC (permalink / raw)
To: Michael S. Tsirkin
Cc: linux-kernel, syzbot+6c21aeb59d0e82eb2782, Jeongjun Park,
Arseny Krasnov, David S . Miller, Stefan Hajnoczi,
Stefano Garzarella, Jason Wang, kvm, virtualization, netdev
On Wed, May 15, 2024 at 5:05 PM Michael S. Tsirkin <mst@redhat.com> wrote:
>
> There are two issues around seqpacket_allow:
> 1. seqpacket_allow is not initialized when socket is
> created. Thus if features are never set, it will be
> read uninitialized.
> 2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
> then seqpacket_allow will not be cleared appropriately
> (existing apps I know about don't usually do this but
> it's legal and there's no way to be sure no one relies
> on this).
>
> To fix:
> - initialize seqpacket_allow after allocation
> - set it unconditionally in set_features
>
> Reported-by: syzbot+6c21aeb59d0e82eb2782@syzkaller.appspotmail.com
> Reported-by: Jeongjun Park <aha310510@gmail.com>
> Fixes: ced7b713711f ("vhost/vsock: support SEQPACKET for transport").
> Cc: Arseny Krasnov <arseny.krasnov@kaspersky.com>
> Cc: David S. Miller <davem@davemloft.net>
> Cc: Stefan Hajnoczi <stefanha@redhat.com>
> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
> Acked-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
> Tested-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
>
Reviewed-by: Eugenio Pérez <eperezma@redhat.com>
Thanks!
> ---
>
>
> Reposting now it's been tested.
>
> drivers/vhost/vsock.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c
> index ec20ecff85c7..bf664ec9341b 100644
> --- a/drivers/vhost/vsock.c
> +++ b/drivers/vhost/vsock.c
> @@ -667,6 +667,7 @@ static int vhost_vsock_dev_open(struct inode *inode, struct file *file)
> }
>
> vsock->guest_cid = 0; /* no CID assigned yet */
> + vsock->seqpacket_allow = false;
>
> atomic_set(&vsock->queued_replies, 0);
>
> @@ -810,8 +811,7 @@ static int vhost_vsock_set_features(struct vhost_vsock *vsock, u64 features)
> goto err;
> }
>
> - if (features & (1ULL << VIRTIO_VSOCK_F_SEQPACKET))
> - vsock->seqpacket_allow = true;
> + vsock->seqpacket_allow = features & (1ULL << VIRTIO_VSOCK_F_SEQPACKET);
>
> for (i = 0; i < ARRAY_SIZE(vsock->vqs); i++) {
> vq = &vsock->vqs[i];
> --
> MST
>
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
2024-05-15 15:05 [PATCH] vhost/vsock: always initialize seqpacket_allow Michael S. Tsirkin
` (2 preceding siblings ...)
2024-05-16 13:37 ` Eugenio Perez Martin
@ 2024-05-17 2:37 ` Jakub Kicinski
2024-06-27 3:37 ` 박정준
4 siblings, 0 replies; 6+ messages in thread
From: Jakub Kicinski @ 2024-05-17 2:37 UTC (permalink / raw)
To: Michael S. Tsirkin
Cc: linux-kernel, syzbot+6c21aeb59d0e82eb2782, Jeongjun Park,
Arseny Krasnov, David S . Miller, Stefan Hajnoczi,
Stefano Garzarella, Jason Wang, Eugenio Pérez, kvm,
virtualization, netdev
On Wed, 15 May 2024 11:05:43 -0400 Michael S. Tsirkin wrote:
> There are two issues around seqpacket_allow:
> 1. seqpacket_allow is not initialized when socket is
> created. Thus if features are never set, it will be
> read uninitialized.
> 2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
> then seqpacket_allow will not be cleared appropriately
> (existing apps I know about don't usually do this but
> it's legal and there's no way to be sure no one relies
> on this).
Acked-by: Jakub Kicinski <kuba@kernel.org>
--
pw-bot: nap
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] vhost/vsock: always initialize seqpacket_allow
2024-05-15 15:05 [PATCH] vhost/vsock: always initialize seqpacket_allow Michael S. Tsirkin
` (3 preceding siblings ...)
2024-05-17 2:37 ` Jakub Kicinski
@ 2024-06-27 3:37 ` 박정준
4 siblings, 0 replies; 6+ messages in thread
From: 박정준 @ 2024-06-27 3:37 UTC (permalink / raw)
To: Michael S. Tsirkin
Cc: linux-kernel, syzbot+6c21aeb59d0e82eb2782, Arseny Krasnov,
David S . Miller, Stefan Hajnoczi, Stefano Garzarella, Jason Wang,
Eugenio Pérez, kvm, virtualization, netdev
nice patch
> 2024. 5. 16. 오전 12:05, Michael S. Tsirkin <mst@redhat.com> 작성:
>
> There are two issues around seqpacket_allow:
> 1. seqpacket_allow is not initialized when socket is
> created. Thus if features are never set, it will be
> read uninitialized.
> 2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
> then seqpacket_allow will not be cleared appropriately
> (existing apps I know about don't usually do this but
> it's legal and there's no way to be sure no one relies
> on this).
>
> To fix:
> - initialize seqpacket_allow after allocation
> - set it unconditionally in set_features
>
> Reported-by: syzbot+6c21aeb59d0e82eb2782@syzkaller.appspotmail.com
> Reported-by: Jeongjun Park <aha310510@gmail.com>
> Fixes: ced7b713711f ("vhost/vsock: support SEQPACKET for transport").
> Cc: Arseny Krasnov <arseny.krasnov@kaspersky.com>
> Cc: David S. Miller <davem@davemloft.net>
> Cc: Stefan Hajnoczi <stefanha@redhat.com>
> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
> Acked-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
> Tested-by: Arseniy Krasnov <avkrasnov@salutedevices.com>
>
> ---
>
>
> Reposting now it's been tested.
>
> drivers/vhost/vsock.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c
> index ec20ecff85c7..bf664ec9341b 100644
> --- a/drivers/vhost/vsock.c
> +++ b/drivers/vhost/vsock.c
> @@ -667,6 +667,7 @@ static int vhost_vsock_dev_open(struct inode *inode, struct file *file)
> }
>
> vsock->guest_cid = 0; /* no CID assigned yet */
> + vsock->seqpacket_allow = false;
>
> atomic_set(&vsock->queued_replies, 0);
>
> @@ -810,8 +811,7 @@ static int vhost_vsock_set_features(struct vhost_vsock *vsock, u64 features)
> goto err;
> }
>
> - if (features & (1ULL << VIRTIO_VSOCK_F_SEQPACKET))
> - vsock->seqpacket_allow = true;
> + vsock->seqpacket_allow = features & (1ULL << VIRTIO_VSOCK_F_SEQPACKET);
>
> for (i = 0; i < ARRAY_SIZE(vsock->vqs); i++) {
> vq = &vsock->vqs[i];
> --
> MST
>
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2024-06-27 3:37 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-05-15 15:05 [PATCH] vhost/vsock: always initialize seqpacket_allow Michael S. Tsirkin
2024-05-16 5:03 ` Jason Wang
2024-05-16 8:09 ` Stefano Garzarella
2024-05-16 13:37 ` Eugenio Perez Martin
2024-05-17 2:37 ` Jakub Kicinski
2024-06-27 3:37 ` 박정준
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).