From: Michal Luczaj <mhal@rbox.co>
To: Stefano Garzarella <sgarzare@redhat.com>,
"David S. Miller" <davem@davemloft.net>,
Eric Dumazet <edumazet@google.com>,
Jakub Kicinski <kuba@kernel.org>,
Paolo Abeni <pabeni@redhat.com>, Simon Horman <horms@kernel.org>,
"Michael S. Tsirkin" <mst@redhat.com>,
Bobby Eshleman <bobby.eshleman@bytedance.com>,
Andrii Nakryiko <andrii@kernel.org>,
Eduard Zingerman <eddyz87@gmail.com>,
Mykola Lysenko <mykolal@fb.com>,
Alexei Starovoitov <ast@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Martin KaFai Lau <martin.lau@linux.dev>,
Song Liu <song@kernel.org>,
Yonghong Song <yonghong.song@linux.dev>,
John Fastabend <john.fastabend@gmail.com>,
KP Singh <kpsingh@kernel.org>,
Stanislav Fomichev <sdf@fomichev.me>,
Hao Luo <haoluo@google.com>, Jiri Olsa <jolsa@kernel.org>,
Shuah Khan <shuah@kernel.org>
Cc: netdev@vger.kernel.org, bpf@vger.kernel.org,
virtualization@lists.linux.dev, linux-kernel@vger.kernel.org,
linux-kselftest@vger.kernel.org, Michal Luczaj <mhal@rbox.co>
Subject: [PATCH net v2 2/3] selftest/bpf: Add test for AF_VSOCK connect() racing sockmap update
Date: Fri, 14 Mar 2025 16:19:35 +0100 [thread overview]
Message-ID: <20250314-vsock-trans-signal-race-v2-2-421a41f60f42@rbox.co> (raw)
In-Reply-To: <20250314-vsock-trans-signal-race-v2-0-421a41f60f42@rbox.co>
Racing signal-interrupted connect() and sockmap update may result in an
unconnected (and missing vsock transport) socket in a sockmap.
Test spends 2 seconds attempting to reach WARN_ON_ONCE().
connect
/ state = SS_CONNECTED /
sock_map_update_elem
if signal_pending
state = SS_UNCONNECTED
connect
transport = NULL
vsock_bpf_recvmsg
WARN_ON_ONCE(!vsk->transport)
Signed-off-by: Michal Luczaj <mhal@rbox.co>
---
.../selftests/bpf/prog_tests/sockmap_basic.c | 111 +++++++++++++++++++++
1 file changed, 111 insertions(+)
diff --git a/tools/testing/selftests/bpf/prog_tests/sockmap_basic.c b/tools/testing/selftests/bpf/prog_tests/sockmap_basic.c
index 1e3e4392dcca0e1722c1982ecc649a80c27443b2..5c278353a924294a1452f650634cec0539804b1a 100644
--- a/tools/testing/selftests/bpf/prog_tests/sockmap_basic.c
+++ b/tools/testing/selftests/bpf/prog_tests/sockmap_basic.c
@@ -3,6 +3,7 @@
#include <error.h>
#include <netinet/tcp.h>
#include <sys/epoll.h>
+#include <linux/time64.h>
#include "test_progs.h"
#include "test_skmsg_load_helpers.skel.h"
@@ -1042,6 +1043,114 @@ static void test_sockmap_vsock_unconnected(void)
xclose(map);
}
+#define CONNECT_SIGNAL_RACE_TIMEOUT 2 /* seconds */
+
+static void sig_handler(int signum)
+{
+ /* nop */
+}
+
+static void connect_signal_racer_cleanup(void *map)
+{
+ xclose(*(int *)map);
+}
+
+static void *connect_signal_racer(void *arg)
+{
+ int map;
+
+ map = bpf_map_create(BPF_MAP_TYPE_SOCKMAP, NULL, sizeof(int),
+ sizeof(int), 1, NULL);
+ if (!ASSERT_OK_FD(map, "bpf_map_create"))
+ return NULL;
+
+ pthread_cleanup_push(connect_signal_racer_cleanup, &map);
+
+ for (;;) {
+ int c = *(int *)arg;
+ int zero = 0;
+
+ (void)bpf_map_update_elem(map, &zero, &c, BPF_ANY);
+
+ if (kill(0, SIGUSR1)) {
+ FAIL_ERRNO("kill");
+ break;
+ }
+
+ pthread_testcancel();
+ }
+
+ pthread_cleanup_pop(1);
+
+ return NULL;
+}
+
+static void test_sockmap_vsock_connect_signal_race(void)
+{
+ struct sockaddr_vm addr = {
+ .svm_family = AF_VSOCK,
+ .svm_cid = VMADDR_CID_LOCAL,
+ .svm_port = VMADDR_PORT_ANY
+ };
+ struct sockaddr_vm bad_addr;
+ sighandler_t orig_handler;
+ pthread_t thread;
+ socklen_t alen;
+ int s, c, p;
+ __u64 tout;
+
+ orig_handler = signal(SIGUSR1, sig_handler);
+ if (!ASSERT_NEQ(orig_handler, SIG_ERR, "signal handler setup"))
+ return;
+
+ s = socket_loopback(AF_VSOCK, SOCK_SEQPACKET | SOCK_NONBLOCK);
+ if (s < 0)
+ goto restore;
+
+ alen = sizeof(addr);
+ if (xgetsockname(s, (struct sockaddr *)&addr, &alen) < 0)
+ goto close;
+
+ bad_addr = addr;
+ bad_addr.svm_cid = 0x42424242; /* non-existing */
+
+ if (xpthread_create(&thread, 0, connect_signal_racer, &c))
+ goto close;
+
+ tout = get_time_ns() + CONNECT_SIGNAL_RACE_TIMEOUT * NSEC_PER_SEC;
+ do {
+ c = xsocket(AF_VSOCK, SOCK_SEQPACKET, 0);
+ if (c < 0)
+ break;
+
+ if (!connect(c, (struct sockaddr *)&addr, alen) ||
+ errno != EINTR)
+ goto retry;
+
+ if (!connect(c, (struct sockaddr *)&bad_addr, alen) ||
+ errno != ESOCKTNOSUPPORT)
+ goto retry;
+
+ if ((recv(c, &(char){0}, 1, MSG_DONTWAIT) < 0) &&
+ errno == ENODEV) {
+ FAIL_ERRNO("recv");
+ tout = 0;
+ }
+retry:
+ xclose(c);
+ p = accept(s, NULL, NULL);
+ if (p >= 0)
+ xclose(p);
+ } while (get_time_ns() < tout);
+
+ ASSERT_OK(pthread_cancel(thread), "pthread_cancel");
+ xpthread_join(thread, NULL);
+close:
+ xclose(s);
+restore:
+ ASSERT_NEQ(signal(SIGUSR1, orig_handler), SIG_ERR, "handler restore");
+}
+
void test_sockmap_basic(void)
{
if (test__start_subtest("sockmap create_update_free"))
@@ -1108,4 +1217,6 @@ void test_sockmap_basic(void)
test_sockmap_skb_verdict_vsock_poll();
if (test__start_subtest("sockmap vsock unconnected"))
test_sockmap_vsock_unconnected();
+ if (test__start_subtest("sockmap vsock connect signal race"))
+ test_sockmap_vsock_connect_signal_race();
}
--
2.48.1
next prev parent reply other threads:[~2025-03-14 15:20 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-03-14 15:19 [PATCH net v2 0/3] vsock/bpf: Handle races between sockmap update and connect() disconnecting Michal Luczaj
2025-03-14 15:19 ` [PATCH net v2 1/3] vsock/bpf: Fix EINTR connect() racing sockmap update Michal Luczaj
2025-03-14 15:19 ` Michal Luczaj [this message]
2025-03-14 15:19 ` [PATCH net v2 3/3] vsock/bpf: Fix bpf recvmsg() racing transport reassignment Michal Luczaj
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250314-vsock-trans-signal-race-v2-2-421a41f60f42@rbox.co \
--to=mhal@rbox.co \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bobby.eshleman@bytedance.com \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=davem@davemloft.net \
--cc=eddyz87@gmail.com \
--cc=edumazet@google.com \
--cc=haoluo@google.com \
--cc=horms@kernel.org \
--cc=john.fastabend@gmail.com \
--cc=jolsa@kernel.org \
--cc=kpsingh@kernel.org \
--cc=kuba@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=martin.lau@linux.dev \
--cc=mst@redhat.com \
--cc=mykolal@fb.com \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=sdf@fomichev.me \
--cc=sgarzare@redhat.com \
--cc=shuah@kernel.org \
--cc=song@kernel.org \
--cc=virtualization@lists.linux.dev \
--cc=yonghong.song@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).