From mboxrd@z Thu Jan 1 00:00:00 1970 From: John Fastabend Subject: Re: [BUG] Bug in netprio_cgroup and netcls_cgroup ? Date: Tue, 22 Jan 2013 16:02:04 -0800 Message-ID: <50FF287C.70906@gmail.com> References: <50FCDB5C.4050608@huawei.com> <50FD0144.1000401@monom.org> <50FD0402.6060400@huawei.com> <50FD09FD.4010804@monom.org> <50FD1113.6010402@huawei.com> <50FD786E.4050108@gmail.com> <20130122100938.GA26820@candlejack.bmw-carit.intra> Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Return-path: DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=RnisD//vxB1vUpu0zGgevIej6RDyyxnWzlpM2eYsgHc=; b=gUVeJNnoQ5PEr32fEKucIwHK+9mHWMfttJorDBnxpSwBLMYVhkYExnkrv71wMwybJs Nq5Kjq/uB3Yfj70zC4/o8v9ZZBMmP4UAfwpARsvIyk9yIjns4GQ2pL2efeOftEHaSwlb NopvQorkvjk/ahKrmKhofJhF/XjMRi3/TIPI9A5WYIW4cGg+Pfzn5BgRNRqIATUyfpdS /abtFuDOtt72Jg4qxPW8Tj0y2WjXemkJRyCORWOr74NWaWIF6Zjs+DQegSaHLomKmRLQ Niodkd41xzFOSlMMC4Hz7Pxh0CyWLN8mp+T2ydzvvZp+gCbE8krFsvczoJI1XS/+DcRy wIJQ== In-Reply-To: <20130122100938.GA26820@candlejack.bmw-carit.intra> Sender: linux-kernel-owner@vger.kernel.org List-ID: Content-Type: text/plain; charset="us-ascii"; format="flowed" To: Daniel Wagner Cc: Li Zefan , John Fastabend , Neil Horman , Daniel Wagner , LKML , netdev@vger.kernel.org, Cgroups [...] >> >> OK, I guess we should do something similar in the netprio, netcls >> cgroups and >> yes document it as you noted in your last comment. > > Here is my attempt to add such a check. I really don't know if this is the > correct way to do so. To test this I have written a test program, which > seems to test the right thing. Please have a look and let me know if > it is correct: http://www.monom.org/misc/scm_rights.c > > And here a dirty first version of the patch: > > > From 49a78d907eaf31c16673025e7e3b4844e419e416 Mon Sep 17 00:00:00 2001 > From: Daniel Wagner > Date: Tue, 22 Jan 2013 11:08:22 +0100 > Subject: [PATCH] net: net_prio: Block attach if a socket is shared > > --- > net/core/netprio_cgroup.c | 30 ++++++++++++++++++++++++++++++ > 1 file changed, 30 insertions(+) > > diff --git a/net/core/netprio_cgroup.c b/net/core/netprio_cgroup.c > index 847c02b..de4e6c5 100644 > --- a/net/core/netprio_cgroup.c > +++ b/net/core/netprio_cgroup.c > @@ -274,9 +274,39 @@ static struct cftype ss_files[] = { > { } /* terminate */ > }; > > +static int check_cnt(const void *v, struct file *file, unsigned n) > +{ > + unsigned *flag = (unsigned *)v; > + int err; > + > + struct socket *sock = sock_from_file(file, &err); > + if (sock && file_count(file) > 1) > + *flag = 1; > + I think this check will catch a lot of cases that are not necessarily sharing a socket across tasks though. For example iscsid passes a file descriptor to the kernel which does a sockfd_lookup() incrementing f_count. Similarly look at dup/clone/etc. In many of these cases I believe it should be OK to move the task around when the sockets are not shared between multiple tasks. .John -- John Fastabend Intel Corporation