From: Arseniy Krasnov <avkrasnov@salutedevices.com>
To: Stefano Garzarella <sgarzare@redhat.com>
Cc: Paolo Abeni <pabeni@redhat.com>,
Bobby Eshleman <bobbyeshleman@meta.com>, <netdev@vger.kernel.org>,
<linux-kernel@vger.kernel.org>,
"Michael S. Tsirkin" <mst@redhat.com>,
Jason Wang <jasowang@redhat.com>,
Xuan Zhuo <xuanzhuo@linux.alibaba.com>,
Yiqi Sun <sunyiqixm@gmail.com>, <kvm@vger.kernel.org>,
<virtualization@lists.linux.dev>
Subject: Re: [PATCH] vsock/virtio: fix vsockmon info leak in non-linear tap, copy
Date: Fri, 8 May 2026 19:17:57 +0300 [thread overview]
Message-ID: <34fe4fe3-4345-4d84-b0b9-739fcb6d8265@salutedevices.com> (raw)
In-Reply-To: <af4GIeSEQ_65V5C2@sgarzare-redhat>
On 08/05/2026 18:50, Stefano Garzarella wrote:
> On Thu, May 07, 2026 at 11:03:57PM +0300, Arseniy Krasnov wrote:
>>> CCing Arseniy and Bobby.
>>
>> Thanks!
>>
>>>
>>> On Tue, May 05, 2026 at 12:26:21PM +0200, Paolo Abeni wrote:
>>>> On 4/30/26 9:11 AM, Yiqi Sun wrote:
>>>>> vsockmon mirrors packets through virtio_transport_build_skb(), which
>>>>> builds a new skb and copies the payload into it. For non-linear skbs,
>>>>> this goes through virtio_transport_copy_nonlinear_skb().
>>>>>
>>>>> Helper manually initializes a iov_iter, but leaves iov_iter.count unset.
>>>>> As a result, skb_copy_datagram_iter() sees zero writable bytes
>>>>> in the destination iterator and copies no payload data.
>>>>>
>>>>> This becomes an info leak because virtio_transport_build_skb() has
>>>>> already reserved payload_len bytes in the new skb with skb_put(). The
>>>>> skb is then returned to the tap path with that payload area still
>>>>> uninitialized, so userspace reading from a vsockmon device can observe
>>>>> heap contents and potentially kernel address.
>>>>>
>>>>> Fix it by initializing iov_iter.count to the number of bytes to copy.
>>>>>
>>>>> Fixes: 4b0bf10eb077 ("vsock/virtio: non-linear skb handling for tap")
>>>>> Signed-off-by: Yiqi Sun <sunyiqixm@gmail.com>
>>>>> ---
>>>>> net/vmw_vsock/virtio_transport_common.c | 2 +-
>>>>> 1 file changed, 1 insertion(+), 1 deletion(-)
>>>>>
>>>>> diff --git a/net/vmw_vsock/virtio_transport_common.c b/net/vmw_vsock/virtio_transport_common.c
>>>>> index 416d533f493d..6b26ee57ccab 100644
>>>>> --- a/net/vmw_vsock/virtio_transport_common.c
>>>>> +++ b/net/vmw_vsock/virtio_transport_common.c
>>>>> @@ -152,7 +152,7 @@ static void virtio_transport_copy_nonlinear_skb(const struct sk_buff *skb,
>>>>> iov_iter.nr_segs = 1;
>>>>>
>>>>> to_copy = min_t(size_t, len, skb->len);
>>>>> -
>>>>> + iov_iter.count = to_copy;
>>>>> skb_copy_datagram_iter(skb, VIRTIO_VSOCK_SKB_CB(skb)->offset,
>>>>> &iov_iter, to_copy);
>>>>
>>>> @Stefano, @Stefan, the patch LGTM, but sashiko pointed out to a
>>>> pre-existing issue you should probably want to address:
>>>>
>>>>> to_copy = min_t(size_t, len, skb->len);
>>>> Does this length calculation account for the offset when a packet is
>>>> split across multiple transmissions?
>>>> If a packet is requeued, VIRTIO_VSOCK_SKB_CB(skb)->offset is increased,
>>>> but to_copy still evaluates to the full length of the skb.
>>>
>>> Yep, I just checked and vhost-vsock is the only place where we call
>>> virtio_transport_deliver_tap_pkt() wiht an offset != 0, but I agree that
>>> we should also fix it.
>>
>> Yes, looks like the only place where offset could be non zero is 'vhost_transport_do_send_pkt()'.
>> And we set valid length in header every attempt to send it:
>>
>> /* Set the correct length in the header */
>> hdr->len = cpu_to_le32(payload_len);
>>
>> In all other places we call 'virtio_transport_deliver_tap_pkt()' with offset == 0. And thus
>> skb->len == hdr->len.
>>
>> So for me looks ok. E.g. len in header is actual data.
>>
>>>
>>> Looking better in net/vmw_vsock/virtio_transport_common.c I think this
>>> is a regression, indeed we have this comment in
>>> virtio_transport_build_skb():
>>>
>>> /* A packet could be split to fit the RX buffer, so we can retrieve
>>> * the payload length from the header and the buffer pointer taking
>>> * care of the offset in the original packet.
>>> */
>>> pkt_hdr = virtio_vsock_hdr(pkt);
>>>
>>> Before commit 71dc9ec9ac7d ("virtio/vsock: replace virtio_vsock_pkt with
>>> sk_buff") we read the payload lenght from the header that is always set
>>> to the right value before delivering the packet to the tap.
>>>
>>> From that commit, we don't to consider the offset anymore since we
>>> started to use `len` from the skb, so IMO we should go back to what we
>>> did before it, I mean:
>>>
>>> payload_len = le32_to_cpu(pkt->hdr.len);
>>>
>>> @Bobby do you remember why we did that change? Or if you see any issue
>>> going back to what we did initially?
>>>
>>>
>>> Also IMO we should avoid to set all the iov_iter fields by hand and
>>> start to use iov_iter_kvec(). Plus, we can just use
>>> skb_copy_datagram_iter() in any case, like we already do in vhost-vsock,
>>> since it already handles linear vs non linear.
>>>
>>> At the end I mean something like this:
>>>
>>> @@ -171,7 +150,7 @@ static struct sk_buff *virtio_transport_build_skb(void *opaque)
>>> * care of the offset in the original packet.
>>> */
>>> pkt_hdr = virtio_vsock_hdr(pkt);
>>> - payload_len = pkt->len;
>>> + payload_len = le32_to_cpu(pkt_hdr->len);
>>>
>>> skb = alloc_skb(sizeof(*hdr) + sizeof(*pkt_hdr) + payload_len,
>>> GFP_ATOMIC);
>>> @@ -214,13 +193,17 @@ static struct sk_buff *virtio_transport_build_skb(void *opaque)
>>> skb_put_data(skb, pkt_hdr, sizeof(*pkt_hdr));
>>>
>>> if (payload_len) {
>>> - if (skb_is_nonlinear(pkt)) {
>>> - void *data = skb_put(skb, payload_len);
>>> + struct iov_iter iov_iter;
>>> + struct kvec kvec;
>>> + void *data = skb_put(skb, payload_len);
>>>
>>> - virtio_transport_copy_nonlinear_skb(pkt, data, payload_len);
>>> - } else {
>>> - skb_put_data(skb, pkt->data, payload_len);
>>> - }
>>> + kvec.iov_base = data;
>>> + kvec.iov_len = payload_len;
>>> + iov_iter_kvec(&iov_iter, READ, &kvec, 1, payload_len);
>>> +
>>> + skb_copy_datagram_iter(pkt,
>>> + VIRTIO_VSOCK_SKB_CB(pkt)->offset,
>>> + &iov_iter, payload_len);
>>> }
>>>
>>> return skb;
>>>
>>> And removing virtio_transport_copy_nonlinear_skb().
>>
>> Yes, this looks shorter and better.
>
> Thanks for confirming, I'll send a series soon and CC you.
> Please review it :-)
Sure, thanks!
>
> Thanks,
> Stefano
>
next prev parent reply other threads:[~2026-05-08 16:18 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-30 7:11 [PATCH] vsock/virtio: fix vsockmon info leak in non-linear tap copy Yiqi Sun
2026-04-30 13:04 ` Luigi Leonardi
2026-05-05 10:26 ` Paolo Abeni
2026-05-05 12:44 ` Stefano Garzarella
2026-05-07 20:03 ` [PATCH] vsock/virtio: fix vsockmon info leak in non-linear tap, copy Arseniy Krasnov
2026-05-08 15:50 ` Stefano Garzarella
2026-05-08 16:17 ` Arseniy Krasnov [this message]
2026-05-07 20:12 ` [PATCH] vsock/virtio: fix vsockmon info leak in non-linear tap copy Bobby Eshleman
2026-05-08 15:58 ` Stefano Garzarella
2026-05-08 16:47 ` Stefano Garzarella
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=34fe4fe3-4345-4d84-b0b9-739fcb6d8265@salutedevices.com \
--to=avkrasnov@salutedevices.com \
--cc=bobbyeshleman@meta.com \
--cc=jasowang@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mst@redhat.com \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=sgarzare@redhat.com \
--cc=sunyiqixm@gmail.com \
--cc=virtualization@lists.linux.dev \
--cc=xuanzhuo@linux.alibaba.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox