[Devel] [PATCH RHEL7 COMMIT] ms/vhost/vsock: refuse CID assigned to the guest->host transport

Vasily Averin vvs at virtuozzo.com
Wed Apr 21 17:53:52 MSK 2021


The commit is pushed to "branch-rh7-3.10.0-1160.21.1.vz7.174.x-ovz" and will appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.21.1.vz7.174.10
------>
commit 375a76ec4f0e125bcbbacc404aea977d920d2a6f
Author: Stefano Garzarella <sgarzare at redhat.com>
Date:   Wed Apr 21 17:53:52 2021 +0300

    ms/vhost/vsock: refuse CID assigned to the guest->host transport
    
    In a nested VM environment, we have to refuse to assign to a nested
    guest the same CID assigned to our guest->host transport.
    In this way, the user can use the local CID for loopback.
    
    Signed-off-by: Stefano Garzarella <sgarzare at redhat.com>
    Signed-off-by: David S. Miller <davem at davemloft.net>
    
    https://jira.sw.ru/browse/PSBM-128702
    (cherry picked from commit ed8640a9612cfd01e1dac31255cea53023353681)
    Signed-off-by: Konstantin Khorenko <khorenko at virtuozzo.com>
---
 drivers/vhost/vsock.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c
index a49d16c..b31c658 100644
--- a/drivers/vhost/vsock.c
+++ b/drivers/vhost/vsock.c
@@ -677,6 +677,12 @@ static int vhost_vsock_set_cid(struct vhost_vsock *vsock, u64 guest_cid)
 	if (guest_cid > U32_MAX)
 		return -EINVAL;
 
+	/* Refuse if CID is assigned to the guest->host transport (i.e. nested
+	 * VM), to make the loopback work.
+	 */
+	if (vsock_find_cid(guest_cid))
+		return -EADDRINUSE;
+
 	/* Refuse if CID is already in use */
 	spin_lock_bh(&vhost_vsock_lock);
 	other = vhost_vsock_get(guest_cid);


More information about the Devel mailing list