Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp6568759ybx; Mon, 11 Nov 2019 11:06:06 -0800 (PST) X-Google-Smtp-Source: APXvYqyDmtVQ3r3DBC9d/xkzgUqg8VUix978PYX0q5PPciu+JCVjVNE5Vr3996xAqGB4kWMJ6Kby X-Received: by 2002:a17:906:a3cc:: with SMTP id ca12mr8432873ejb.302.1573499166526; Mon, 11 Nov 2019 11:06:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573499166; cv=none; d=google.com; s=arc-20160816; b=VTTQnD+arj6us1lzc5OeYij7ZqyqtqUjTplk0VEryCUDfRJ4WMiKW4LahdGYOjk0fH gd9mZTb+GrEjnpQvC2U+/MO8CVMeOUEt7LM587vUoYUAN1xiVhBgusnKbKKuBIM/AtDZ gluSeiB7eJE1s9OhIf5iq3wSp2CKCjj3hCTWPGI8lRNnuhbUA01Ci0g7uVkQKvRcJ7wF 0QsyHHocRITXdOeb0Am7Zb9q4w+tStJPjCBeC24zzjAkDddshEgocw54kka0B4V/BE+9 MyAL2eRlrZ01HW7t2VjPXXffzpOwZXEcXqUB3/Po9KB1R+t6cMD+pcwxJo8jGn2g3BQU 9NXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=DGVs+CQZ3Uzyv+f6ZtuxhBdOb/7OFwBZrNwG7sBCSmE=; b=ZMY+lttut+qmLfLsKbYFMYzkBOFa2UGHevlP+6EkbLoMA8pqAu2lCDfAqOr0mEeT1U CeedmMZzUE5CMKQHho9yb6g/frkyyvLrobt/g7kSfmJZQGlAgyr0SyPpNKVid/bOixuM fQWZh1A72Bk/D5THTRPeQ1+QDxdGi8XUA9V1QZ8sUcmGYNT13x5W9V2OH/HjfvFPpoSw WZlY0JXAxO3JbLUL1GzNgKJjyQv/fUpOK1DiKKmmMVnVYT8uBkRmHy9PM3ve/SLzjDUN ICB/e2W4rbA5DQQCP5RVqyUPvrpwxg6eI6CqYE52tN6rbNerFpUzLxI+4cmVF6X4/x1S C5rg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=g4mnMNr2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y17si3172639ejc.360.2019.11.11.11.05.42; Mon, 11 Nov 2019 11:06:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=g4mnMNr2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729922AbfKKSsz (ORCPT + 99 others); Mon, 11 Nov 2019 13:48:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:41948 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728503AbfKKSss (ORCPT ); Mon, 11 Nov 2019 13:48:48 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0B1B521655; Mon, 11 Nov 2019 18:48:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573498127; bh=CwCZfoRPCth1IRqPRRz/UpOF2NJeF6VJrV2ec1jRlFM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=g4mnMNr2jeXKuWdblLKQ7o5uizRkaxVJwowyoMg1oY0j8KYVGkrB7etdMUidek+eR z8L2+Vv2UzlncWJhsEJs5vQvQWB1NlcgH+H3VoVveX7licgsgg1rgHRs7nD45tkXfg UU+YBz7ODpqC8xwybQ2JQtgLL6nWM2998Rd2c3H8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stephen Barber , Stefano Garzarella , "David S. Miller" Subject: [PATCH 5.3 023/193] vsock/virtio: fix sock refcnt holding during the shutdown Date: Mon, 11 Nov 2019 19:26:45 +0100 Message-Id: <20191111181501.929904168@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191111181459.850623879@linuxfoundation.org> References: <20191111181459.850623879@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stefano Garzarella [ Upstream commit ad8a7220355d39cddce8eac1cea9677333e8b821 ] The "42f5cda5eaf4" commit rightly set SOCK_DONE on peer shutdown, but there is an issue if we receive the SHUTDOWN(RDWR) while the virtio_transport_close_timeout() is scheduled. In this case, when the timeout fires, the SOCK_DONE is already set and the virtio_transport_close_timeout() will not call virtio_transport_reset() and virtio_transport_do_close(). This causes that both sockets remain open and will never be released, preventing the unloading of [virtio|vhost]_transport modules. This patch fixes this issue, calling virtio_transport_reset() and virtio_transport_do_close() when we receive the SHUTDOWN(RDWR) and there is nothing left to read. Fixes: 42f5cda5eaf4 ("vsock/virtio: set SOCK_DONE on peer shutdown") Cc: Stephen Barber Signed-off-by: Stefano Garzarella Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/vmw_vsock/virtio_transport_common.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/net/vmw_vsock/virtio_transport_common.c +++ b/net/vmw_vsock/virtio_transport_common.c @@ -870,9 +870,11 @@ virtio_transport_recv_connected(struct s if (le32_to_cpu(pkt->hdr.flags) & VIRTIO_VSOCK_SHUTDOWN_SEND) vsk->peer_shutdown |= SEND_SHUTDOWN; if (vsk->peer_shutdown == SHUTDOWN_MASK && - vsock_stream_has_data(vsk) <= 0) { - sock_set_flag(sk, SOCK_DONE); - sk->sk_state = TCP_CLOSING; + vsock_stream_has_data(vsk) <= 0 && + !sock_flag(sk, SOCK_DONE)) { + (void)virtio_transport_reset(vsk, NULL); + + virtio_transport_do_close(vsk, true); } if (le32_to_cpu(pkt->hdr.flags)) sk->sk_state_change(sk);