Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp750947ybl; Wed, 4 Dec 2019 10:14:37 -0800 (PST) X-Google-Smtp-Source: APXvYqzg6G3QuxYpypR8KQVnFugi9mcXY01tshWdWS0tdrQE1x2F4Ra4HDSD2AzWxjgk0UeXHhi2 X-Received: by 2002:aca:75d0:: with SMTP id q199mr3833698oic.121.1575483277284; Wed, 04 Dec 2019 10:14:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575483277; cv=none; d=google.com; s=arc-20160816; b=xEsb7t1Y6w1CKPq6rsa7VPSsDJ7Z2J6pEo5j4vNGd0oCJfEybN5kL8/2bClLnU2vFQ Qj+D4Fik4i8f8UbvTl+pw+jT1woRRUVHXWsLvS09wxkFS/sMcBFiHzUVfr3wipvP6X4H S10CWlhSYXSlN8ENWXMuWvw1j6KrD8Re1Tr+2h1ud2a4cRPshSB2zEr7dv4o+s2XNm/G 1Hmu2YbW3YvpnldagvXtOP0RDcYPfujQBHzr9gGpeP9NEE8SjsqVvq6IFevByhkof3GR IOTE+LmIgURntOCEkuCvdWJzedjCGdURLbxkTC8qUR1WZJEZjXWn1DawSA9BAE89H68o l3lA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=SczmNxMzt+Fd+VdBkVIHpIv9i6A0tY60PJqbRPJJ5ko=; b=K1d91zCsy0ZMpLQmdB6EJuR8HiXlI6FkOV5Ymt18pyLa1gMHMf+LyDfSRLQ4n9S49v ZMKvERY61KJtA0wQPXANwcglNXNBSjfXd1y4Cqnw6eLVa+8h0y4qtZclX9QTwJN5mPfK tez4D8W8dmXdMKG5KXgfiLoNVT8JNwOvDyr+z5HBYi0KpfsrVAK2lpbFspERIHqDVuKV zBO+tlLMG8lht582rrjiri+jtstnejFW6ATAUXksh5Z41hSV5KbKDw4GdbBlPP8MQ7Te F//7Ja7jX1+JJA3f7c+82hU8CvRwDsn2QD9rBX/QU4bvS3vsJoKwO8Mp8EcmaJyaVf9T VpmA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AIitDm7o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p3si3713273otk.154.2019.12.04.10.14.24; Wed, 04 Dec 2019 10:14:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AIitDm7o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730830AbfLDSNO (ORCPT + 99 others); Wed, 4 Dec 2019 13:13:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:42190 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731714AbfLDSNL (ORCPT ); Wed, 4 Dec 2019 13:13:11 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4442E20675; Wed, 4 Dec 2019 18:13:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575483190; bh=7B2zsv4wmb26jk/t27o3Uj0Jm6oJDggdc1ltkcsGrAc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AIitDm7o9WlDatRUvQrd8u4C7PUf5+aRBl8ZR1GxR3X3nGXyygsbz8ajIps0by3dD 2ee/XrMm/93LbC4fTTJCpfqF9EWPPhs2QXElOogzoa/0ZLWBvd+KpQx53VPwi53PYP UWcOF3UPeGNhxnRmdeF9VXcyE5BTF9KoE0ce+g1Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lepton Wu , Jorgen Hansen , "David S. Miller" , Sasha Levin Subject: [PATCH 4.9 034/125] VSOCK: bind to random port for VMADDR_PORT_ANY Date: Wed, 4 Dec 2019 18:55:39 +0100 Message-Id: <20191204175321.062982160@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175308.377746305@linuxfoundation.org> References: <20191204175308.377746305@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lepton Wu [ Upstream commit 8236b08cf50f85bbfaf48910a0b3ee68318b7c4b ] The old code always starts from fixed port for VMADDR_PORT_ANY. Sometimes when VMM crashed, there is still orphaned vsock which is waiting for close timer, then it could cause connection time out for new started VM if they are trying to connect to same port with same guest cid since the new packets could hit that orphaned vsock. We could also fix this by doing more in vhost_vsock_reset_orphans, but any way, it should be better to start from a random local port instead of a fixed one. Signed-off-by: Lepton Wu Reviewed-by: Jorgen Hansen Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/vmw_vsock/af_vsock.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c index 7566395e526d2..18f377306884b 100644 --- a/net/vmw_vsock/af_vsock.c +++ b/net/vmw_vsock/af_vsock.c @@ -97,6 +97,7 @@ #include #include #include +#include #include #include #include @@ -501,9 +502,13 @@ out: static int __vsock_bind_stream(struct vsock_sock *vsk, struct sockaddr_vm *addr) { - static u32 port = LAST_RESERVED_PORT + 1; + static u32 port = 0; struct sockaddr_vm new_addr; + if (!port) + port = LAST_RESERVED_PORT + 1 + + prandom_u32_max(U32_MAX - LAST_RESERVED_PORT); + vsock_addr_init(&new_addr, addr->svm_cid, addr->svm_port); if (addr->svm_port == VMADDR_PORT_ANY) { -- 2.20.1