Message ID | 5cf1337b4f6e82bc0a4eb0bef422a53dcc9d584a.1659862577.git.peilin.ye@bytedance.com (mailing list archive) |
---|---|
State | Superseded |
Delegated to: | Netdev Maintainers |
Headers | show |
Series | [net,v2,1/2] vsock: Fix memory leak in vsock_connect() | expand |
On Sun, Aug 07, 2022 at 02:00:46AM -0700, Peilin Ye wrote: >From: Peilin Ye <peilin.ye@bytedance.com> > >Imagine two non-blocking vsock_connect() requests on the same socket. >The first request schedules @connect_work, and after it times out, >vsock_connect_timeout() sets *sock* state back to TCP_CLOSE, but keeps >*socket* state as SS_CONNECTING. > >Later, the second request returns -EALREADY, meaning the socket "already >has a pending connection in progress", even if the first request has >already timed out. > >As suggested by Stefano, fix it by setting *socket* state back to >SS_UNCONNECTED, so that the second request will return -ETIMEDOUT. > >Suggested-by: Stefano Garzarella <sgarzare@redhat.com> >Fixes: d021c344051a ("VSOCK: Introduce VM Sockets") >Signed-off-by: Peilin Ye <peilin.ye@bytedance.com> >--- >(new patch in v2) Thanks for sending this :-) Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c index fe14f6cbca22..e857dbf1a32b 100644 --- a/net/vmw_vsock/af_vsock.c +++ b/net/vmw_vsock/af_vsock.c @@ -1286,6 +1286,7 @@ static void vsock_connect_timeout(struct work_struct *work) if (sk->sk_state == TCP_SYN_SENT && (sk->sk_shutdown != SHUTDOWN_MASK)) { sk->sk_state = TCP_CLOSE; + sk->sk_socket->state = SS_UNCONNECTED; sk->sk_err = ETIMEDOUT; sk_error_report(sk); vsock_transport_cancel_pkt(vsk);