During connect(), acting on a signal/timeout by disconnecting an already
established socket leads to several issues:

1. connect() invoking vsock_transport_cancel_pkt() ->
   virtio_transport_purge_skbs() may race with sendmsg() invoking
   virtio_transport_get_credit(). This results in a permanently elevated
   `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.

2. connect() resetting a connected socket's state may race with socket
   being placed in a sockmap. A disconnected socket remaining in a sockmap
   breaks sockmap's assumptions. And gives rise to WARNs.

3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a
   transport change/drop after TCP_ESTABLISHED. Which poses a problem for
   any simultaneous sendmsg() or connect() and may result in a
   use-after-free/null-ptr-deref.

Do not disconnect socket on signal/timeout. Keep the logic for unconnected
sockets: they don't linger, can't be placed in a sockmap, are rejected by
sendmsg().

[1]: 
https://lore.kernel.org/netdev/[email protected]/
[2]: 
https://lore.kernel.org/netdev/[email protected]/
[3]: 
https://lore.kernel.org/netdev/[email protected]/

Fixes: d021c344051a ("VSOCK: Introduce VM Sockets")
Signed-off-by: Michal Luczaj <[email protected]>
---
Note that this patch does not tackle related problems described in
https://lore.kernel.org/netdev/[email protected]/
---
 net/vmw_vsock/af_vsock.c | 48 ++++++++++++++++++++++++++++++++++++++++--------
 1 file changed, 40 insertions(+), 8 deletions(-)

diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c
index 76763247a377..a52e7dbe7878 100644
--- a/net/vmw_vsock/af_vsock.c
+++ b/net/vmw_vsock/af_vsock.c
@@ -1528,6 +1528,23 @@ static void vsock_connect_timeout(struct work_struct 
*work)
        sock_put(sk);
 }
 
+static void vsock_reset_interrupted(struct sock *sk)
+{
+       struct vsock_sock *vsk = vsock_sk(sk);
+
+       /* Try to cancel VIRTIO_VSOCK_OP_REQUEST skb sent out by
+        * transport->connect().
+        */
+       vsock_transport_cancel_pkt(vsk);
+
+       /* Listener might have already responded with VIRTIO_VSOCK_OP_RESPONSE.
+        * Its handling expects our sk_state == TCP_SYN_SENT, which hereby we
+        * break. In such case VIRTIO_VSOCK_OP_RST will follow.
+        */
+       sk->sk_state = TCP_CLOSE;
+       sk->sk_socket->state = SS_UNCONNECTED;
+}
+
 static int vsock_connect(struct socket *sock, struct sockaddr *addr,
                         int addr_len, int flags)
 {
@@ -1661,18 +1678,33 @@ static int vsock_connect(struct socket *sock, struct 
sockaddr *addr,
                timeout = schedule_timeout(timeout);
                lock_sock(sk);
 
+               /* Connection established. Whatever happens to socket once we
+                * release it, that's not connect()'s concern. No need to go
+                * into signal and timeout handling. Call it a day.
+                *
+                * Note that allowing to "reset" an already established socket
+                * here is racy and insecure.
+                */
+               if (sk->sk_state == TCP_ESTABLISHED)
+                       break;
+
+               /* If connection was _not_ established and a signal/timeout came
+                * to be, we want the socket's state reset. User space may want
+                * to retry.
+                *
+                * sk_state != TCP_ESTABLISHED implies that socket is not on
+                * vsock_connected_table. We keep the binding and the transport
+                * assigned.
+                */
                if (signal_pending(current)) {
                        err = sock_intr_errno(timeout);
-                       sk->sk_state = sk->sk_state == TCP_ESTABLISHED ? 
TCP_CLOSING : TCP_CLOSE;
-                       sock->state = SS_UNCONNECTED;
-                       vsock_transport_cancel_pkt(vsk);
-                       vsock_remove_connected(vsk);
+                       vsock_reset_interrupted(sk);
                        goto out_wait;
-               } else if ((sk->sk_state != TCP_ESTABLISHED) && (timeout == 0)) 
{
+               }
+
+               if (timeout == 0) {
                        err = -ETIMEDOUT;
-                       sk->sk_state = TCP_CLOSE;
-                       sock->state = SS_UNCONNECTED;
-                       vsock_transport_cancel_pkt(vsk);
+                       vsock_reset_interrupted(sk);
                        goto out_wait;
                }
 

---
base-commit: 5442a9da69789741bfda39f34ee7f69552bf0c56
change-id: 20250815-vsock-interrupted-connect-f92dfa5042cd

Best regards,
-- 
Michal Luczaj <[email protected]>


Reply via email to