From: Michal Luczaj <mhal@rbox.co>
To: Stefano Garzarella <sgarzare@redhat.com>
Cc: netdev@vger.kernel.org, "Xuan Zhuo" <xuanzhuo@linux.alibaba.com>,
bpf@vger.kernel.org, linux-kernel@vger.kernel.org,
"Luigi Leonardi" <leonardi@redhat.com>,
"David S. Miller" <davem@davemloft.net>,
"Wongi Lee" <qwerty@theori.io>,
"Eugenio Pérez" <eperezma@redhat.com>,
"Michael S. Tsirkin" <mst@redhat.com>,
"Eric Dumazet" <edumazet@google.com>,
kvm@vger.kernel.org, "Paolo Abeni" <pabeni@redhat.com>,
"Stefan Hajnoczi" <stefanha@redhat.com>,
"Jason Wang" <jasowang@redhat.com>,
"Simon Horman" <horms@kernel.org>,
"Hyunwoo Kim" <v4bel@theori.io>,
"Jakub Kicinski" <kuba@kernel.org>,
virtualization@lists.linux.dev,
"Bobby Eshleman" <bobby.eshleman@bytedance.com>,
stable@vger.kernel.org
Subject: Re: [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes
Date: Mon, 13 Jan 2025 11:12:52 +0100 [thread overview]
Message-ID: <cccb1a4f-5495-4db1-801e-eca211b757c3@rbox.co> (raw)
In-Reply-To: <CAGxU2F7BoMNi-z=SHsmCV5+99=CxHo4dxFeJnJ5=q9X=CM3QMA@mail.gmail.com>
On 1/13/25 10:07, Stefano Garzarella wrote:
> On Mon, 13 Jan 2025 at 09:57, Stefano Garzarella <sgarzare@redhat.com> wrote:
>> On Sun, Jan 12, 2025 at 11:42:30PM +0100, Michal Luczaj wrote:
>
> [...]
>
>>>
>>> So, if I get this right:
>>> 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)
>>> 2. transport->release() calls vsock_remove_bound() without checking if sk
>>> was bound and moved to bound list (refcnt=1)
>>> 3. vsock_bind() assumes sk is in unbound list and before
>>> __vsock_insert_bound(vsock_bound_sockets()) calls
>>> __vsock_remove_bound() which does:
>>> list_del_init(&vsk->bound_table); // nop
>>> sock_put(&vsk->sk); // refcnt=0
>>>
>>> The following fixes things for me. I'm just not certain that's the only
>>> place where transport destruction may lead to an unbound socket being
>>> removed from the unbound list.
>>>
>>> diff --git a/net/vmw_vsock/virtio_transport_common.c b/net/vmw_vsock/virtio_transport_common.c
>>> index 7f7de6d88096..0fe807c8c052 100644
>>> --- a/net/vmw_vsock/virtio_transport_common.c
>>> +++ b/net/vmw_vsock/virtio_transport_common.c
>>> @@ -1303,7 +1303,8 @@ void virtio_transport_release(struct vsock_sock *vsk)
>>>
>>> if (remove_sock) {
>>> sock_set_flag(sk, SOCK_DONE);
>>> - virtio_transport_remove_sock(vsk);
>>> + if (vsock_addr_bound(&vsk->local_addr))
>>> + virtio_transport_remove_sock(vsk);
>>
>> I don't get this fix, virtio_transport_remove_sock() calls
>> vsock_remove_sock()
>> vsock_remove_bound()
>> if (__vsock_in_bound_table(vsk))
>> __vsock_remove_bound(vsk);
>>
>>
>> So, should already avoid this issue, no?
>
> I got it wrong, I see now what are you trying to do, but I don't think
> we should skip virtio_transport_remove_sock() entirely, it also purge
> the rx_queue.
Isn't rx_queue empty-by-definition in case of !__vsock_in_bound_table(vsk)?
>> Can the problem be in vsock_bind() ?
Well, I wouldn't say so.
>> Is this issue pre-existing or introduced by this series?
>
> I think this is pre-existing, can you confirm?
Yup, I agree, pre-existing.
> In that case, I'd not stop this series, and fix it in another patch/series.
Yeah, sure thing.
Thanks,
Michal
next prev parent reply other threads:[~2025-01-13 10:13 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-01-10 8:35 [PATCH net v2 0/5] vsock: some fixes due to transport de-assignment Stefano Garzarella
2025-01-10 8:35 ` [PATCH net v2 1/5] vsock/virtio: discard packets if the transport changes Stefano Garzarella
2025-01-10 22:46 ` Hyunwoo Kim
2025-01-12 22:42 ` Michal Luczaj
2025-01-13 8:57 ` Stefano Garzarella
2025-01-13 9:07 ` Stefano Garzarella
2025-01-13 10:12 ` Michal Luczaj [this message]
2025-01-13 11:05 ` Stefano Garzarella
2025-01-13 13:51 ` Michal Luczaj
2025-01-13 15:01 ` Stefano Garzarella
2025-01-14 0:09 ` Michal Luczaj
2025-01-14 10:16 ` Stefano Garzarella
2025-01-14 16:31 ` Michal Luczaj
2025-01-16 8:57 ` Stefano Garzarella
2025-01-17 22:02 ` Michal Luczaj
2025-01-10 8:35 ` [PATCH net v2 2/5] vsock/bpf: return early if transport is not assigned Stefano Garzarella
2025-01-10 8:35 ` [PATCH net v2 3/5] vsock/virtio: cancel close work in the destructor Stefano Garzarella
2025-01-10 10:57 ` Luigi Leonardi
2025-01-10 22:48 ` Hyunwoo Kim
2025-01-10 8:35 ` [PATCH net v2 4/5] vsock: reset socket state when de-assigning the transport Stefano Garzarella
2025-01-10 10:56 ` Luigi Leonardi
2025-01-10 11:25 ` Stefano Garzarella
2025-01-10 8:35 ` [PATCH net v2 5/5] vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] Stefano Garzarella
2025-01-10 9:49 ` Luigi Leonardi
2025-01-10 22:52 ` Hyunwoo Kim
2025-01-14 11:50 ` [PATCH net v2 0/5] vsock: some fixes due to transport de-assignment patchwork-bot+netdevbpf
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cccb1a4f-5495-4db1-801e-eca211b757c3@rbox.co \
--to=mhal@rbox.co \
--cc=bobby.eshleman@bytedance.com \
--cc=bpf@vger.kernel.org \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=eperezma@redhat.com \
--cc=horms@kernel.org \
--cc=jasowang@redhat.com \
--cc=kuba@kernel.org \
--cc=kvm@vger.kernel.org \
--cc=leonardi@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=mst@redhat.com \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=qwerty@theori.io \
--cc=sgarzare@redhat.com \
--cc=stable@vger.kernel.org \
--cc=stefanha@redhat.com \
--cc=v4bel@theori.io \
--cc=virtualization@lists.linux.dev \
--cc=xuanzhuo@linux.alibaba.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox