Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp762060ybl; Wed, 4 Dec 2019 10:25:18 -0800 (PST) X-Google-Smtp-Source: APXvYqw+JE8DJS0fZAPWrL3yx1GAjxYTQak0bTpZL8sz2l+Akmg4XiwiG3DNK6erjKCGjY89dqfs X-Received: by 2002:a9d:48a:: with SMTP id 10mr3354199otm.95.1575483918452; Wed, 04 Dec 2019 10:25:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575483918; cv=none; d=google.com; s=arc-20160816; b=nUuzXqwHo6dPHrKNLtB9ttUqMZsMJp1STGf5aMwGdMVesbeXhRibqrjqe0TXRZpOCq dbDEInXWgxCZnSl8Q5lbyLB6737fyjpkLchimD6fJFUlE1+qvNdJS5ETq1ZzQybDGV+L Lf+d/ZU+4UAQKVedcU9jNorebddkQeT9E39p5c+5j+7S/85s64QiVi/mXlSVsWVpMXfd U4+zFsv9yEYcQy+aAX2ZPCzkKLKzPD6lCljG9+nge5jIMGCBF4ESjnz2vYWFWceZ3zwi irNqnvxTUTcJDuofvzC55qOUEpEZxWHSX3hVv0mTY4IbojLC76IbmG2XZSpAAjHzg7xh 2+Kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vOCkJ2OcFpMFhu+Sl6esUP/xMWSrXa1gcpT8AGcsgEQ=; b=zf1hiz2nzNJMkh56KIM5+AfeZMx5MzIQkb83IhTrmpHRTO/bquSiWvvfj69KBfMOOS n1Gtw8S1hW5ne1wERapVHwDTcF6ZpQTT28I6eyOe79XfN+bgqrpsUMxAR089+sS0gLSG P6L2EXmiD1EgtzE+rv71gGmf8V/zHYhnQs61XdTCgGmohrcFGtybedrb8mf9MCOuXNU2 15xXYdgxo1yGyHCCOmtSLyt5ZfHpLkisg80Boa7gQYDX+cQp9Lzxlr4WG8lVlOlOqiei +Lgcfh5I5/dpqrSww2FJFeKSv37IwvlEVlIM9JGu/vfQDj7wBaujcAV6IbHvIK2F/D0y ovlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GN5nj3jD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b203si1328360oif.101.2019.12.04.10.25.05; Wed, 04 Dec 2019 10:25:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GN5nj3jD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729994AbfLDSDL (ORCPT + 99 others); Wed, 4 Dec 2019 13:03:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:46392 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729223AbfLDSDJ (ORCPT ); Wed, 4 Dec 2019 13:03:09 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3AE382073B; Wed, 4 Dec 2019 18:03:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482588; bh=49R4dsczAXUDQig1FJdYXwGIq5keVjng8TTGV/QH6IY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GN5nj3jDFs0s7dacMHMaMGTgC8XXWjyUh1GGt8EDdJ9rXEav4EngSS0mc2pUFgut+ X59Q5jBh55O54dY1ZkZYgGt0Mwf2D37Zf954o2fKamur4+0lNrj6osTW/stvUPzeFc Oh8yvaPDfcE8VXH3QUAjE35RJkMlClNaslg5boK8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lepton Wu , Jorgen Hansen , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 057/209] VSOCK: bind to random port for VMADDR_PORT_ANY Date: Wed, 4 Dec 2019 18:54:29 +0100 Message-Id: <20191204175325.274172448@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lepton Wu [ Upstream commit 8236b08cf50f85bbfaf48910a0b3ee68318b7c4b ] The old code always starts from fixed port for VMADDR_PORT_ANY. Sometimes when VMM crashed, there is still orphaned vsock which is waiting for close timer, then it could cause connection time out for new started VM if they are trying to connect to same port with same guest cid since the new packets could hit that orphaned vsock. We could also fix this by doing more in vhost_vsock_reset_orphans, but any way, it should be better to start from a random local port instead of a fixed one. Signed-off-by: Lepton Wu Reviewed-by: Jorgen Hansen Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/vmw_vsock/af_vsock.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c index 1939b77e98b72..73eac97e19fb1 100644 --- a/net/vmw_vsock/af_vsock.c +++ b/net/vmw_vsock/af_vsock.c @@ -107,6 +107,7 @@ #include #include #include +#include #include #include #include @@ -487,9 +488,13 @@ out: static int __vsock_bind_stream(struct vsock_sock *vsk, struct sockaddr_vm *addr) { - static u32 port = LAST_RESERVED_PORT + 1; + static u32 port = 0; struct sockaddr_vm new_addr; + if (!port) + port = LAST_RESERVED_PORT + 1 + + prandom_u32_max(U32_MAX - LAST_RESERVED_PORT); + vsock_addr_init(&new_addr, addr->svm_cid, addr->svm_port); if (addr->svm_port == VMADDR_PORT_ANY) { -- 2.20.1