vhost: check vhost message header size read
diff mbox series

Message ID 20200116104444.3862-1-maxime.coquelin@redhat.com
State Superseded
Delegated to: Maxime Coquelin
Headers show
Series
  • vhost: check vhost message header size read
Related show

Checks

Context Check Description
ci/Intel-compilation fail Compilation issues
ci/iol-nxp-Performance fail Performance Testing issues
ci/iol-mellanox-Performance success Performance Testing PASS
ci/iol-testing success Testing PASS
ci/iol-intel-Performance success Performance Testing PASS
ci/travis-robot warning Travis build: failed
ci/checkpatch success coding style OK

Commit Message

Maxime Coquelin Jan. 16, 2020, 10:44 a.m. UTC
This patch adds a check to ensure the read size of
the Vhost-user message header is not smaller than
the expected size.

Fixes: 8f972312b8f4 ("vhost: support vhost-user")
Cc: stable@dpdk.org

Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
Signed-off-by: Maxime Coquelin <maxime.coquelin@redhat.com>
---
 lib/librte_vhost/vhost_user.c | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

Comments

Tiwei Bie Jan. 17, 2020, 7:54 a.m. UTC | #1
On Thu, Jan 16, 2020 at 11:44:44AM +0100, Maxime Coquelin wrote:
> This patch adds a check to ensure the read size of
> the Vhost-user message header is not smaller than
> the expected size.
> 
> Fixes: 8f972312b8f4 ("vhost: support vhost-user")
> Cc: stable@dpdk.org
> 
> Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
> Signed-off-by: Maxime Coquelin <maxime.coquelin@redhat.com>
> ---
>  lib/librte_vhost/vhost_user.c | 6 +++++-
>  1 file changed, 5 insertions(+), 1 deletion(-)
> 
> diff --git a/lib/librte_vhost/vhost_user.c b/lib/librte_vhost/vhost_user.c
> index 69b84a8820..0b7d1e288e 100644
> --- a/lib/librte_vhost/vhost_user.c
> +++ b/lib/librte_vhost/vhost_user.c
> @@ -2440,8 +2440,12 @@ read_vhost_message(int sockfd, struct VhostUserMsg *msg)
>  
>  	ret = read_fd_message(sockfd, (char *)msg, VHOST_USER_HDR_SIZE,
>  		msg->fds, VHOST_MEMORY_MAX_NREGIONS, &msg->fd_num);
> -	if (ret <= 0)
> +	if (ret <= 0) {
>  		return ret;
> +	} else if (ret != VHOST_USER_HDR_SIZE) {
> +		VHOST_LOG_CONFIG(ERR, "Unexpected header size read\n");
> +		return -1;

It's better to close the potential fds in msg->fds[]
e.g. by calling close_msg_fds(msg).

Regards,
Tiwei

> +	}
>  
>  	if (msg->size) {
>  		if (msg->size > sizeof(msg->payload)) {
> -- 
> 2.21.0
>
Maxime Coquelin Feb. 5, 2020, 2:12 p.m. UTC | #2
On 1/17/20 8:54 AM, Tiwei Bie wrote:
> On Thu, Jan 16, 2020 at 11:44:44AM +0100, Maxime Coquelin wrote:
>> This patch adds a check to ensure the read size of
>> the Vhost-user message header is not smaller than
>> the expected size.
>>
>> Fixes: 8f972312b8f4 ("vhost: support vhost-user")
>> Cc: stable@dpdk.org
>>
>> Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
>> Signed-off-by: Maxime Coquelin <maxime.coquelin@redhat.com>
>> ---
>>  lib/librte_vhost/vhost_user.c | 6 +++++-
>>  1 file changed, 5 insertions(+), 1 deletion(-)
>>
>> diff --git a/lib/librte_vhost/vhost_user.c b/lib/librte_vhost/vhost_user.c
>> index 69b84a8820..0b7d1e288e 100644
>> --- a/lib/librte_vhost/vhost_user.c
>> +++ b/lib/librte_vhost/vhost_user.c
>> @@ -2440,8 +2440,12 @@ read_vhost_message(int sockfd, struct VhostUserMsg *msg)
>>  
>>  	ret = read_fd_message(sockfd, (char *)msg, VHOST_USER_HDR_SIZE,
>>  		msg->fds, VHOST_MEMORY_MAX_NREGIONS, &msg->fd_num);
>> -	if (ret <= 0)
>> +	if (ret <= 0) {
>>  		return ret;
>> +	} else if (ret != VHOST_USER_HDR_SIZE) {
>> +		VHOST_LOG_CONFIG(ERR, "Unexpected header size read\n");
>> +		return -1;
> 
> It's better to close the potential fds in msg->fds[]
> e.g. by calling close_msg_fds(msg).

Correct, adding it in v2.

Thanks,
Maxime

> Regards,
> Tiwei
> 
>> +	}
>>  
>>  	if (msg->size) {
>>  		if (msg->size > sizeof(msg->payload)) {
>> -- 
>> 2.21.0
>>
>

Patch
diff mbox series

diff --git a/lib/librte_vhost/vhost_user.c b/lib/librte_vhost/vhost_user.c
index 69b84a8820..0b7d1e288e 100644
--- a/lib/librte_vhost/vhost_user.c
+++ b/lib/librte_vhost/vhost_user.c
@@ -2440,8 +2440,12 @@  read_vhost_message(int sockfd, struct VhostUserMsg *msg)
 
 	ret = read_fd_message(sockfd, (char *)msg, VHOST_USER_HDR_SIZE,
 		msg->fds, VHOST_MEMORY_MAX_NREGIONS, &msg->fd_num);
-	if (ret <= 0)
+	if (ret <= 0) {
 		return ret;
+	} else if (ret != VHOST_USER_HDR_SIZE) {
+		VHOST_LOG_CONFIG(ERR, "Unexpected header size read\n");
+		return -1;
+	}
 
 	if (msg->size) {
 		if (msg->size > sizeof(msg->payload)) {