get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/139066/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 139066,
    "url": "https://patches.dpdk.org/api/patches/139066/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/TYAP286MB0649588660B26F0CC783BAABD83D2@TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<TYAP286MB0649588660B26F0CC783BAABD83D2@TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM>",
    "list_archive_url": "https://inbox.dpdk.org/dev/TYAP286MB0649588660B26F0CC783BAABD83D2@TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM",
    "date": "2024-04-03T02:57:18",
    "name": "vhost: fix crash caused by accessing a freed vsocket",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "8adbe340942497a201130c78eeb0472038bb7f91",
    "submitter": {
        "id": 3305,
        "url": "https://patches.dpdk.org/api/people/3305/?format=api",
        "name": "Gongming Chen",
        "email": "chengongming1900@outlook.com"
    },
    "delegate": {
        "id": 2642,
        "url": "https://patches.dpdk.org/api/users/2642/?format=api",
        "username": "mcoquelin",
        "first_name": "Maxime",
        "last_name": "Coquelin",
        "email": "maxime.coquelin@redhat.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/TYAP286MB0649588660B26F0CC783BAABD83D2@TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM/mbox/",
    "series": [
        {
            "id": 31661,
            "url": "https://patches.dpdk.org/api/series/31661/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=31661",
            "date": "2024-04-03T02:57:18",
            "name": "vhost: fix crash caused by accessing a freed vsocket",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/31661/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/139066/comments/",
    "check": "warning",
    "checks": "https://patches.dpdk.org/api/patches/139066/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 8F13A43DD9;\n\tWed,  3 Apr 2024 04:57:23 +0200 (CEST)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 350C940144;\n\tWed,  3 Apr 2024 04:57:23 +0200 (CEST)",
            "from TYVP286CU001.outbound.protection.outlook.com\n (mail-japaneastazolkn19010001.outbound.protection.outlook.com [52.103.43.1])\n by mails.dpdk.org (Postfix) with ESMTP id 0B1D6400D7;\n Wed,  3 Apr 2024 04:57:21 +0200 (CEST)",
            "from TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM (2603:1096:402:38::13)\n by OSZP286MB1799.JPNP286.PROD.OUTLOOK.COM (2603:1096:604:1bc::8) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.46; Wed, 3 Apr\n 2024 02:57:18 +0000",
            "from TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM\n ([fe80::3b2d:34ba:11e6:b203]) by TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM\n ([fe80::3b2d:34ba:11e6:b203%4]) with mapi id 15.20.7409.042; Wed, 3 Apr 2024\n 02:57:18 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=VSZHcvk4qX2plpHZ8EKHInNJckc4P0jwVLtqkW7ATJBo4CpXnKaBOPoqGWCnyyoA1XHD4XwNc6Vzou+FGo/YJjCW9qCtQlcrAR8lKJC522xoo4DtWzv+eyASxdo0qnv5sMKmygj+fd6HbO3dAgsnns1ZPd08ZJPw8yRZgDepr3wKX0n/0m/OoDot4cDZtGhvEQFrCCi7gdtdcrikX26fEaQlbTHk/hrymAhOnKWRooidr66FcPkhEhMf83+IuMRVlNCW2FWNZJgxGhXVL8WFOJelzjrugRRf4aD1W79iLmsnR25xbV7q7rey2pBx2I8UZj7dcF801NNWu9Peywi+3A==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=4cN0s20wvoW/kr5+2RxBN+yd+DriL3h0+X8zjOzzLRY=;\n b=D2lL2dSTIwfrxJ2/ibC6cW1Wx6Aa9M0aDVdOXWihJgxiqYMM3rJJ43Qz1ED0/KeY4VdO5Qw9nj216Jznevlvsf8O3jInsdcmqBFNaNtaYIRJtDQEW1cX1kg2dYJ0mYoJPfeZBjqSIO8aQudN2dIzz2teOxnLeRw5Yz0ePtBUHqXMZ1KGq2p79wGhERU3CupYdOQs1RVSmSq8tVefnQ9kcbHSwES3YpXkmLX0sHWdsl1YKNChLUIccwnloH2Vw55l+YOFwTUUbxrKabdttc9GmAgA8jSc7p31ri9KgxsNIsvTYQ+5D/5/vvFY/GOos02QbV9j6E+FJwyzFdD2ILImIA==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=none; dmarc=none;\n dkim=none; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com;\n s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=4cN0s20wvoW/kr5+2RxBN+yd+DriL3h0+X8zjOzzLRY=;\n b=cyt6E2jYWh/ZZRk1AKFpBhxmEwYbANxjovgFq6fX5YpI50FULfOwkkYyj8pN/AqhVVfWpvuJWcEWyuOKLBwg8WNwfdS6DCa2eXqiaamgAtjL7uf6UUebTVvfF4C7x1KS4Vq3SKHHrhoyDTzFLMtKIAgI/vaGuZ8vF5geiq7h2K0HyfCydf9VinaU1ealTj3nUEEyuYo5w7qSbbKQLOkAsQx/3GgkVEVs/p3qrYJQm2kCXqCgPPJlHgoKbN22232CNWvKVObsYlkoDJ3Zkg/jL/u2iJ911BaFP8OaJTVO/NIvwF3dg/WpJ3MGgyZqEVKjBflmIA6NYupraLl+W9E9iw==",
        "From": "Gongming Chen <chengongming1900@outlook.com>",
        "To": "\"maxime.coquelin@redhat.com\" <maxime.coquelin@redhat.com>,\n \"chenbox@nvidia.com\" <chenbox@nvidia.com>",
        "CC": "\"dev@dpdk.org\" <dev@dpdk.org>, Gongming Chen <chengm11@chinatelecom.cn>,\n \"stable@dpdk.org\" <stable@dpdk.org>",
        "Subject": "[PATCH] vhost: fix crash caused by accessing a freed vsocket",
        "Thread-Topic": "[PATCH] vhost: fix crash caused by accessing a freed vsocket",
        "Thread-Index": "AQHahN+F+HV3UmLxxECApksGTpoAyLFV2snH",
        "Date": "Wed, 3 Apr 2024 02:57:18 +0000",
        "Message-ID": "\n <TYAP286MB0649588660B26F0CC783BAABD83D2@TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM>",
        "References": "<20240402092402.43452-1-chengongming1900@outlook.com>",
        "In-Reply-To": "<20240402092402.43452-1-chengongming1900@outlook.com>",
        "Accept-Language": "zh-CN, en-US",
        "Content-Language": "zh-CN",
        "X-MS-Has-Attach": "",
        "X-MS-TNEF-Correlator": "",
        "x-tmn": "[kLCMODZiBg6SbbpZfQFMvN2n7cqOrfQY]",
        "x-ms-publictraffictype": "Email",
        "x-ms-traffictypediagnostic": "TYAP286MB0649:EE_|OSZP286MB1799:EE_",
        "x-ms-office365-filtering-correlation-id": "9913d6be-2b57-4747-ed30-08dc5389c64e",
        "x-microsoft-antispam": "BCL:0;",
        "x-microsoft-antispam-message-info": "\n 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",
        "x-ms-exchange-antispam-messagedata-chunkcount": "1",
        "x-ms-exchange-antispam-messagedata-0": "\n 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",
        "Content-Type": "multipart/alternative;\n boundary=\"_000_TYAP286MB0649588660B26F0CC783BAABD83D2TYAP286MB0649JPNP_\"",
        "MIME-Version": "1.0",
        "X-OriginatorOrg": "outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-AuthSource": "TYAP286MB0649.JPNP286.PROD.OUTLOOK.COM",
        "X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg": [
            "\n 00000000-0000-0000-0000-000000000000",
            "\n 00000000-0000-0000-0000-000000000000"
        ],
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 9913d6be-2b57-4747-ed30-08dc5389c64e",
        "X-MS-Exchange-CrossTenant-originalarrivaltime": "03 Apr 2024 02:57:18.1982 (UTC)",
        "X-MS-Exchange-CrossTenant-fromentityheader": "Hosted",
        "X-MS-Exchange-CrossTenant-id": "84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa",
        "X-MS-Exchange-CrossTenant-rms-persistedconsumerorg": [
            "\n 00000000-0000-0000-0000-000000000000",
            "\n 00000000-0000-0000-0000-000000000000"
        ],
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "OSZP286MB1799",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "From: Gongming Chen <chengm11@chinatelecom.cn>\n\nWhen a vhost user message handling error in the event dispatch thread,\nvsocket reconn is added to the reconnection list of the reconnection\nthread.\nSince the reconnection, event dispatching and app configuration thread\ndo not have common thread protection restrictions, the app config\nthread freed vsocket in the rte_vhost_driver_unregister process,\nbut vsocket reconn can still exist in the reconn_list through this\nmechanism.\nThen in the reconnection thread, the vsocket is connected again and\nconn is added to the dispatch thread.\nFinally, the vsocket is accessed again in the event dispatch thread,\nresulting in a use-after-free error.\n\nThis patch adds a vhost threads read-write lock to restrict\nreconnection, event dispatching and app configuration threads.\nWhen the vhost driver unregisters, it exclusively holds the lock to\nsafely free the vsocket.\n\n#0  0x0000000000000025 in ?? ()\n#1  0x0000000003ed7ca0 in vhost_user_read_cb at lib/vhost/socket.c:330\n#2  0x0000000003ed625f in fdset_event_dispatch at lib/vhost/fd_man.c:283\n\nFixes: e623e0c6d8a5 (\"vhost: add vhost-user client mode\")\nCc: stable@dpdk.org\n\nSigned-off-by: Gongming Chen <chengm11@chinatelecom.cn>\n---\n lib/vhost/fd_man.c       |  3 +++\n lib/vhost/meson.build    |  1 +\n lib/vhost/socket.c       | 30 ++++++++++++------------------\n lib/vhost/vhost_thread.c | 33 +++++++++++++++++++++++++++++++++\n lib/vhost/vhost_thread.h | 16 ++++++++++++++++\n 5 files changed, 65 insertions(+), 18 deletions(-)\n create mode 100644 lib/vhost/vhost_thread.c\n create mode 100644 lib/vhost/vhost_thread.h\n\n--\n2.32.1 (Apple Git-133)",
    "diff": "diff --git a/lib/vhost/fd_man.c b/lib/vhost/fd_man.c\nindex 481e6b900a..b0e0aa2640 100644\n--- a/lib/vhost/fd_man.c\n+++ b/lib/vhost/fd_man.c\n@@ -9,6 +9,7 @@\n #include <rte_log.h>\n\n #include \"fd_man.h\"\n+#include \"vhost_thread.h\"\n\n RTE_LOG_REGISTER_SUFFIX(vhost_fdset_logtype, fdset, INFO);\n #define RTE_LOGTYPE_VHOST_FDMAN vhost_fdset_logtype\n@@ -250,6 +251,7 @@ fdset_event_dispatch(void *arg)\n                 if (val < 0)\n                         continue;\n\n+               vhost_thread_read_lock();\n                 need_shrink = 0;\n                 for (i = 0; i < numfds; i++) {\n                         pthread_mutex_lock(&pfdset->fd_mutex);\n@@ -303,6 +305,7 @@ fdset_event_dispatch(void *arg)\n\n                 if (need_shrink)\n                         fdset_shrink(pfdset);\n+               vhost_thread_read_unlock();\n         }\n\n         return 0;\ndiff --git a/lib/vhost/meson.build b/lib/vhost/meson.build\nindex 41b622a9be..7bc1840ed0 100644\n--- a/lib/vhost/meson.build\n+++ b/lib/vhost/meson.build\n@@ -25,6 +25,7 @@ sources = files(\n         'vdpa.c',\n         'vhost.c',\n         'vhost_crypto.c',\n+        'vhost_thread.c',\n         'vhost_user.c',\n         'virtio_net.c',\n         'virtio_net_ctrl.c',\ndiff --git a/lib/vhost/socket.c b/lib/vhost/socket.c\nindex 96b3ab5595..e05d36f549 100644\n--- a/lib/vhost/socket.c\n+++ b/lib/vhost/socket.c\n@@ -20,6 +20,7 @@\n #include \"fd_man.h\"\n #include \"vduse.h\"\n #include \"vhost.h\"\n+#include \"vhost_thread.h\"\n #include \"vhost_user.h\"\n\n\n@@ -463,6 +464,7 @@ vhost_user_client_reconnect(void *arg __rte_unused)\n         struct vhost_user_reconnect *reconn, *next;\n\n         while (1) {\n+               vhost_thread_read_lock();\n                 pthread_mutex_lock(&reconn_list.mutex);\n\n                 /*\n@@ -494,6 +496,7 @@ vhost_user_client_reconnect(void *arg __rte_unused)\n                 }\n\n                 pthread_mutex_unlock(&reconn_list.mutex);\n+               vhost_thread_read_unlock();\n                 sleep(1);\n         }\n\n@@ -1071,7 +1074,7 @@ rte_vhost_driver_unregister(const char *path)\n         if (path == NULL)\n                 return -1;\n\n-again:\n+       vhost_thread_write_lock();\n         pthread_mutex_lock(&vhost_user.mutex);\n\n         for (i = 0; i < vhost_user.vsocket_cnt; i++) {\n@@ -1083,14 +1086,10 @@ rte_vhost_driver_unregister(const char *path)\n                         vduse_device_destroy(path);\n                 } else if (vsocket->is_server) {\n                         /*\n-                        * If r/wcb is executing, release vhost_user's\n-                        * mutex lock, and try again since the r/wcb\n-                        * may use the mutex lock.\n+                        * The vhost thread write lock has been acquired,\n+                        * and fd must be deleted from fdset.\n                          */\n-                       if (fdset_try_del(&vhost_user.fdset, vsocket->socket_fd) == -1) {\n-                               pthread_mutex_unlock(&vhost_user.mutex);\n-                               goto again;\n-                       }\n+                       fdset_del(&vhost_user.fdset, vsocket->socket_fd);\n                 } else if (vsocket->reconnect) {\n                         vhost_user_remove_reconnect(vsocket);\n                 }\n@@ -1102,17 +1101,10 @@ rte_vhost_driver_unregister(const char *path)\n                         next = TAILQ_NEXT(conn, next);\n\n                         /*\n-                        * If r/wcb is executing, release vsocket's\n-                        * conn_mutex and vhost_user's mutex locks, and\n-                        * try again since the r/wcb may use the\n-                        * conn_mutex and mutex locks.\n+                        * The vhost thread write lock has been acquired,\n+                        * and fd must be deleted from fdset.\n                          */\n-                       if (fdset_try_del(&vhost_user.fdset,\n-                                         conn->connfd) == -1) {\n-                               pthread_mutex_unlock(&vsocket->conn_mutex);\n-                               pthread_mutex_unlock(&vhost_user.mutex);\n-                               goto again;\n-                       }\n+                       fdset_del(&vhost_user.fdset, conn->connfd);\n\n                         VHOST_CONFIG_LOG(path, INFO, \"free connfd %d\", conn->connfd);\n                         close(conn->connfd);\n@@ -1134,9 +1126,11 @@ rte_vhost_driver_unregister(const char *path)\n                 vhost_user.vsockets[i] = vhost_user.vsockets[count];\n                 vhost_user.vsockets[count] = NULL;\n                 pthread_mutex_unlock(&vhost_user.mutex);\n+               vhost_thread_write_unlock();\n                 return 0;\n         }\n         pthread_mutex_unlock(&vhost_user.mutex);\n+       vhost_thread_write_unlock();\n\n         return -1;\n }\ndiff --git a/lib/vhost/vhost_thread.c b/lib/vhost/vhost_thread.c\nnew file mode 100644\nindex 0000000000..c7661b745e\n--- /dev/null\n+++ b/lib/vhost/vhost_thread.c\n@@ -0,0 +1,33 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ * Copyright (c) 2024 China Telecom Cloud Technology Co., Ltd\n+ */\n+\n+#include <rte_rwlock.h>\n+\n+#include \"vhost_thread.h\"\n+\n+static rte_rwlock_t vhost_thread_lock = RTE_RWLOCK_INITIALIZER;\n+\n+void\n+vhost_thread_read_lock(void)\n+{\n+       rte_rwlock_read_lock(&vhost_thread_lock);\n+}\n+\n+void\n+vhost_thread_read_unlock(void)\n+{\n+       rte_rwlock_read_unlock(&vhost_thread_lock);\n+}\n+\n+void\n+vhost_thread_write_lock(void)\n+{\n+       rte_rwlock_write_lock(&vhost_thread_lock);\n+}\n+\n+void\n+vhost_thread_write_unlock(void)\n+{\n+       rte_rwlock_write_unlock(&vhost_thread_lock);\n+}\ndiff --git a/lib/vhost/vhost_thread.h b/lib/vhost/vhost_thread.h\nnew file mode 100644\nindex 0000000000..61679172af\n--- /dev/null\n+++ b/lib/vhost/vhost_thread.h\n@@ -0,0 +1,16 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ * Copyright (c) 2024 China Telecom Cloud Technology Co., Ltd\n+ */\n+\n+#ifndef _VHOST_THREAD_H_\n+#define _VHOST_THREAD_H_\n+\n+void vhost_thread_read_lock(void);\n+\n+void vhost_thread_read_unlock(void);\n+\n+void vhost_thread_write_lock(void);\n+\n+void vhost_thread_write_unlock(void);\n+\n+#endif\n",
    "prefixes": []
}