vhost_vsock_alloc_skb() returns NULL for packets advertising a length
larger than VIRTIO_VSOCK_MAX_PKT_BUF_SIZE in the packet header. However,
this is only checked once the SKB has been allocated and, if the length
in the packet header is zero, the SKB may not be freed immediately.
Hoist the size check before the SKB allocation so that an iovec larger
than VIRTIO_VSOCK_MAX_PKT_BUF_SIZE + the header size is rejected
outright. The subsequent check on the length field in the header can
then simply check that the allocated SKB is indeed large enough to hold
the packet.
Signed-off-by: Will Deacon <will@kernel.org>
---
drivers/vhost/vsock.c | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c
index 802153e23073..66a0f060770e 100644
--- a/drivers/vhost/vsock.c
+++ b/drivers/vhost/vsock.c
@@ -344,6 +344,9 @@ vhost_vsock_alloc_skb(struct vhost_virtqueue *vq,
len = iov_length(vq->iov, out);
+ if (len > VIRTIO_VSOCK_MAX_PKT_BUF_SIZE + VIRTIO_VSOCK_SKB_HEADROOM)
+ return NULL;
+
/* len contains both payload and hdr */
skb = virtio_vsock_alloc_skb(len, GFP_KERNEL);
if (!skb)
@@ -367,8 +370,7 @@ vhost_vsock_alloc_skb(struct vhost_virtqueue *vq,
return skb;
/* The pkt is too big or the length in the header is invalid */
- if (payload_len > VIRTIO_VSOCK_MAX_PKT_BUF_SIZE ||
- payload_len + sizeof(*hdr) > len) {
+ if (payload_len + sizeof(*hdr) > len) {
kfree_skb(skb);
return NULL;
}
--
2.50.0.714.g196bf9f422-goog
On Wed, Jun 25, 2025 at 02:15:39PM +0100, Will Deacon wrote: >vhost_vsock_alloc_skb() returns NULL for packets advertising a length >larger than VIRTIO_VSOCK_MAX_PKT_BUF_SIZE in the packet header. However, >this is only checked once the SKB has been allocated and, if the length >in the packet header is zero, the SKB may not be freed immediately. > >Hoist the size check before the SKB allocation so that an iovec larger >than VIRTIO_VSOCK_MAX_PKT_BUF_SIZE + the header size is rejected >outright. The subsequent check on the length field in the header can >then simply check that the allocated SKB is indeed large enough to hold >the packet. LGTM, but should we consider this as stable material adding a Fixes tag? Thanks, Stefano > >Signed-off-by: Will Deacon <will@kernel.org> >--- > drivers/vhost/vsock.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > >diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c >index 802153e23073..66a0f060770e 100644 >--- a/drivers/vhost/vsock.c >+++ b/drivers/vhost/vsock.c >@@ -344,6 +344,9 @@ vhost_vsock_alloc_skb(struct vhost_virtqueue *vq, > > len = iov_length(vq->iov, out); > >+ if (len > VIRTIO_VSOCK_MAX_PKT_BUF_SIZE + VIRTIO_VSOCK_SKB_HEADROOM) >+ return NULL; >+ > /* len contains both payload and hdr */ > skb = virtio_vsock_alloc_skb(len, GFP_KERNEL); > if (!skb) >@@ -367,8 +370,7 @@ vhost_vsock_alloc_skb(struct vhost_virtqueue *vq, > return skb; > > /* The pkt is too big or the length in the header is invalid */ >- if (payload_len > VIRTIO_VSOCK_MAX_PKT_BUF_SIZE || >- payload_len + sizeof(*hdr) > len) { >+ if (payload_len + sizeof(*hdr) > len) { > kfree_skb(skb); > return NULL; > } >-- >2.50.0.714.g196bf9f422-goog > >
On Fri, Jun 27, 2025 at 12:36:46PM +0200, Stefano Garzarella wrote: > On Wed, Jun 25, 2025 at 02:15:39PM +0100, Will Deacon wrote: > > vhost_vsock_alloc_skb() returns NULL for packets advertising a length > > larger than VIRTIO_VSOCK_MAX_PKT_BUF_SIZE in the packet header. However, > > this is only checked once the SKB has been allocated and, if the length > > in the packet header is zero, the SKB may not be freed immediately. > > > > Hoist the size check before the SKB allocation so that an iovec larger > > than VIRTIO_VSOCK_MAX_PKT_BUF_SIZE + the header size is rejected > > outright. The subsequent check on the length field in the header can > > then simply check that the allocated SKB is indeed large enough to hold > > the packet. > > LGTM, but should we consider this as stable material adding a Fixes tag? Yup, absolutely. I put it first so that it can be backported easily but, for some reason, I thought networking didn't CC stable. I have no idea _why_ I thought that, so I'll add it (and a Fixes: line) for v2! That seems to be: Fixes: 71dc9ec9ac7d ("virtio/vsock: replace virtio_vsock_pkt with sk_buff") from what I can tell. Cheers, Will
On Mon, Jun 30, 2025 at 01:51:07PM +0100, Will Deacon wrote: >On Fri, Jun 27, 2025 at 12:36:46PM +0200, Stefano Garzarella wrote: >> On Wed, Jun 25, 2025 at 02:15:39PM +0100, Will Deacon wrote: >> > vhost_vsock_alloc_skb() returns NULL for packets advertising a length >> > larger than VIRTIO_VSOCK_MAX_PKT_BUF_SIZE in the packet header. However, >> > this is only checked once the SKB has been allocated and, if the length >> > in the packet header is zero, the SKB may not be freed immediately. >> > >> > Hoist the size check before the SKB allocation so that an iovec larger >> > than VIRTIO_VSOCK_MAX_PKT_BUF_SIZE + the header size is rejected >> > outright. The subsequent check on the length field in the header can >> > then simply check that the allocated SKB is indeed large enough to hold >> > the packet. >> >> LGTM, but should we consider this as stable material adding a Fixes tag? > >Yup, absolutely. I put it first so that it can be backported easily but, >for some reason, I thought networking didn't CC stable. I have no idea >_why_ I thought that, so I'll add it (and a Fixes: line) for v2! yeah, this was the case till last year IIRC, but we always used Fixes tag, also if we didn't cc stable. > >That seems to be: > > Fixes: 71dc9ec9ac7d ("virtio/vsock: replace virtio_vsock_pkt with sk_buff") > >from what I can tell. I think so! Thanks, Stefano
© 2016 - 2025 Red Hat, Inc.