From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id CB023CCFA18 for ; Tue, 11 Nov 2025 16:29:56 +0000 (UTC) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vIrFB-00087D-Ee; Tue, 11 Nov 2025 11:29:21 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vIpxp-0006b8-JC for qemu-devel@nongnu.org; Tue, 11 Nov 2025 10:07:22 -0500 Received: from out28-79.mail.aliyun.com ([115.124.28.79]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vIpxn-0003sm-3a for qemu-devel@nongnu.org; Tue, 11 Nov 2025 10:07:21 -0500 Received: from Sun.localdomain(mailfrom:mail@jiesong.me fp:SMTPD_---.fK4t-DF_1762873311 cluster:ay29) by smtp.aliyun-inc.com; Tue, 11 Nov 2025 23:01:54 +0800 From: Jie Song To: qemu-devel@nongnu.org Cc: armbru@redhat.com, Jie Song Subject: [PATCH] monitor/qmp: cleanup socket listener sources early to avoid fd handling race Date: Tue, 11 Nov 2025 23:01:44 +0800 Message-ID: <20251111150144.76751-1-mail@jiesong.me> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=115.124.28.79; envelope-from=mail@jiesong.me; helo=out28-79.mail.aliyun.com X-Spam_score_int: -18 X-Spam_score: -1.9 X-Spam_bar: - X-Spam_report: (-1.9 / 5.0 requ) BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-Mailman-Approved-At: Tue, 11 Nov 2025 11:29:18 -0500 X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org From: Jie Song When starting a dummy QEMU process with virsh, monitor_init_qmp() enables IOThread monitoring of the QMP fd by default. However, a race condition exists during the initialization phase: the IOThread only removes the main thread's fd watch when it reaches qio_net_listener_set_client_func_full(), which may be delayed under high system load. This creates a window between monitor_qmp_setup_handlers_bh() and qio_net_listener_set_client_func_full() where both the main thread and IOThread are simultaneously monitoring the same fd and processing events. This race can cause either the main thread or the IOThread to hang and become unresponsive. Fix this by proactively cleaning up the listener's IO sources in monitor_init_qmp() before the IOThread initializes QMP monitoring, ensuring exclusive fd ownership and eliminating the race condition. The fix introduces socket_chr_listener_cleanup() to destroy and unref all existing IO sources on the socket chardev listener, guaranteeing that no concurrent fd monitoring occurs during the transition to IOThread handling. Signed-off-by: Jie Song --- chardev/char-socket.c | 18 ++++++++++++++++++ include/chardev/char-socket.h | 2 ++ monitor/qmp.c | 6 ++++++ 3 files changed, 26 insertions(+) diff --git a/chardev/char-socket.c b/chardev/char-socket.c index 62852e3caf..073a9da855 100644 --- a/chardev/char-socket.c +++ b/chardev/char-socket.c @@ -656,6 +656,24 @@ static void tcp_chr_telnet_destroy(SocketChardev *s) } } +void socket_chr_listener_cleanup(Chardev *chr) +{ + SocketChardev *s = SOCKET_CHARDEV(chr); + + if (s->listener) { + QIONetListener *listener = s->listener; + size_t i; + + for (i = 0; i < listener->nsioc; i++) { + if (listener->io_source[i]) { + g_source_destroy(listener->io_source[i]); + g_source_unref(listener->io_source[i]); + listener->io_source[i] = NULL; + } + } + } +} + static void tcp_chr_update_read_handler(Chardev *chr) { SocketChardev *s = SOCKET_CHARDEV(chr); diff --git a/include/chardev/char-socket.h b/include/chardev/char-socket.h index d6d13ad37f..682440c6de 100644 --- a/include/chardev/char-socket.h +++ b/include/chardev/char-socket.h @@ -84,4 +84,6 @@ typedef struct SocketChardev SocketChardev; DECLARE_INSTANCE_CHECKER(SocketChardev, SOCKET_CHARDEV, TYPE_CHARDEV_SOCKET) +void socket_chr_listener_cleanup(Chardev *chr); + #endif /* CHAR_SOCKET_H */ diff --git a/monitor/qmp.c b/monitor/qmp.c index cb99a12d94..d9d1fafa70 100644 --- a/monitor/qmp.c +++ b/monitor/qmp.c @@ -25,6 +25,7 @@ #include "qemu/osdep.h" #include "chardev/char-io.h" +#include "chardev/char-socket.h" #include "monitor-internal.h" #include "qapi/error.h" #include "qapi/qapi-commands-control.h" @@ -537,6 +538,11 @@ void monitor_init_qmp(Chardev *chr, bool pretty, Error **errp) * e.g. the chardev is in client mode, with wait=on. */ remove_fd_in_watch(chr); + /* + * Clean up listener IO sources early to prevent racy fd + * handling between the main thread and the I/O thread. + */ + socket_chr_listener_cleanup(chr); /* * We can't call qemu_chr_fe_set_handlers() directly here * since chardev might be running in the monitor I/O -- 2.43.0