Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp732656ybl; Wed, 4 Dec 2019 09:59:20 -0800 (PST) X-Google-Smtp-Source: APXvYqwpWauzoHYwrdmrwtSW9p1WDuFb/lAJlOdBKGj1w8SgB2UuHkXtu6HTYA2c73u19CNr34RR X-Received: by 2002:a05:6830:232f:: with SMTP id q15mr3627313otg.35.1575482360274; Wed, 04 Dec 2019 09:59:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575482360; cv=none; d=google.com; s=arc-20160816; b=hVllK/tlw08fTTlK6tngSdYhHKADgymf3Cuw/urL35y8Be4TbjbC/J11cS2bgc+mMa OTztHXs1Q2dd052hNJcGSWP6yfkJ77wiefwImQckj8YUtcUNSBVYP13gQU2t2x+1VAW0 HDxwjArLAXQ8WKdRkv68JxzTDyYj0Gzh3j9lYOWlBwAQoADb20Mp7NMCxkS2xZnXRlvs 6BxYC5ovLjdDl2KTEU9LVFoVA4UyFoT0gGHBvZF/Dr2HaLwe3xN/GiMMWmuG2aiP2/dg bV32T/2SV9Z61oL0vgi0VnaHuLTyw8Rnuz8+XLAeC6xzNaJ39cm8ax0YbVbwla4AxtGt GDHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=CkqaAkDx6aSkbm7QZd9Q0LKXKW0wQ6f88DWlOfILLo4=; b=JDZZ9aZwV+L8bquYEqyhB/QDh2GVVpmIHb6bAr35rvI5/C2wm/pA/ReVXQwA0d4jq6 Z7rQYaLTMQvyf9ynNLWIRFLuEY65+CLS4Ks2aHmgpYQPEqWtBnMFsVQF++lx8pOCwSnB 4RRPupqAGcykm48gTQFuyLfDQF1BLVhYJaTA95dZeEq7QVyON06ydXr/us+2o8FMFNL+ BGjWe/7sIGvFWY5jSAZJ/KeR68iFOyCnarQZ7mBeZ6K2WVZ+l78bIfzwX1YcegysYvSa CF5wMTtkjdTKkCbN8vH+KH9BPOyPXCD1BLSNhp/Wl0QNLsAbrJ2yDorypLrIk9k0mD+E jShQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dl4xZVkE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 7si3798842otv.26.2019.12.04.09.59.07; Wed, 04 Dec 2019 09:59:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dl4xZVkE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728651AbfLDR6P (ORCPT + 99 others); Wed, 4 Dec 2019 12:58:15 -0500 Received: from mail.kernel.org ([198.145.29.99]:60562 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728629AbfLDR6N (ORCPT ); Wed, 4 Dec 2019 12:58:13 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4E1CB2081B; Wed, 4 Dec 2019 17:58:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482292; bh=4p/gyj2qvuKUImwhJLlJyPMVzrfpz0Q0/esrhrsDW6I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dl4xZVkE8Tdn9o1ku+spNNRIvAbDLdTYr4W928tNJ/BNk13t8TiQ+sihQuOAtRw99 ZI+e5rFpMsd7hmCtdofNdcVBtT5Fwpvqv+2dYjk73bmoRatRJGkeELAaoDLknIuzNL biljHTFxA6JePykPRj0Z3CnDYH/Sqc1gG/hQdgdc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lepton Wu , Jorgen Hansen , "David S. Miller" , Sasha Levin Subject: [PATCH 4.4 28/92] VSOCK: bind to random port for VMADDR_PORT_ANY Date: Wed, 4 Dec 2019 18:49:28 +0100 Message-Id: <20191204174332.317108068@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204174327.215426506@linuxfoundation.org> References: <20191204174327.215426506@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lepton Wu [ Upstream commit 8236b08cf50f85bbfaf48910a0b3ee68318b7c4b ] The old code always starts from fixed port for VMADDR_PORT_ANY. Sometimes when VMM crashed, there is still orphaned vsock which is waiting for close timer, then it could cause connection time out for new started VM if they are trying to connect to same port with same guest cid since the new packets could hit that orphaned vsock. We could also fix this by doing more in vhost_vsock_reset_orphans, but any way, it should be better to start from a random local port instead of a fixed one. Signed-off-by: Lepton Wu Reviewed-by: Jorgen Hansen Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/vmw_vsock/af_vsock.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c index 7f1d166ce6128..412d56614fd5e 100644 --- a/net/vmw_vsock/af_vsock.c +++ b/net/vmw_vsock/af_vsock.c @@ -89,6 +89,7 @@ #include #include #include +#include #include #include #include @@ -483,9 +484,13 @@ out: static int __vsock_bind_stream(struct vsock_sock *vsk, struct sockaddr_vm *addr) { - static u32 port = LAST_RESERVED_PORT + 1; + static u32 port = 0; struct sockaddr_vm new_addr; + if (!port) + port = LAST_RESERVED_PORT + 1 + + prandom_u32_max(U32_MAX - LAST_RESERVED_PORT); + vsock_addr_init(&new_addr, addr->svm_cid, addr->svm_port); if (addr->svm_port == VMADDR_PORT_ANY) { -- 2.20.1