Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2304776imc; Tue, 12 Mar 2019 11:01:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqyTgShegmwg0SONpATtoW4bg/7o+dBDVFThKTThmCKEt48UvVtGM0IMFjDIeoJmFTFkSIXs X-Received: by 2002:a17:902:6b48:: with SMTP id g8mr40981635plt.21.1552413663738; Tue, 12 Mar 2019 11:01:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552413663; cv=none; d=google.com; s=arc-20160816; b=TaTmP6Jykl3b7ANg+2iNEuD+ilKX1jVLHtudogJ8BMeqqKzbIrg2JkPCLMG84yElT5 MbL+Z7ywTXlGawsmc4fy5tP4N4XNzZ+8vFkYnsGsAAAEXAFDX4Vq8FjSbqPHt8s1URCA 7f5nkelP7eW4bAj1hc3p2bBuBcbJvaD0yVZsaC9kZmfqjZt3/z5OmTVJDyX+vcGf0o7e D1Dmf7AMiLUTS/WC3tIbJApd6JvS90J147H219zz8OOWquiJF6i3+9XgdkU6BTrO0kMq p38ARRx3hH4bSvQ//nw2QRYzcWzjiF6yT7qOjIyTeKNEZba+HE80V6P6HjXBWwBaGyct MkKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/d5Vr7eOl4AZcO6r4gRzOz6XsdpPsvN5mIU1jj9ylqc=; b=w1ddfCSMi+Ji+OKyaMt3u97ds5gYp+gQuXYMMkf97ATc+0olRfFzm9pQjGoSPjdzqg AudW6nhU3JGc9ZITm5kSkF+u1mnNoNzFJUANy0egykL+uNyQacgw6eIzU25SPypL4bZv m/XcsDGsi1af2ROmfHOtOFNhjzLOyL1vYGTQ4qMEEt8u143ipWE9fcV+ezaR4X5mka8o J+tNVH/b0FGnL9H3Tn2s3IqNzq5ZGhvojM+0eoDPVLbaFpzXNxF0LQL2K27hcyGqMTec 4Ar6MuRgAgqY4anThB80WIPcyhfp4cwLBRjjQu7phjzy4Yw++X33XjY9Vgk5smJSRRIQ nhoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Et8KYC8i; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q207si7908133pgq.321.2019.03.12.11.00.48; Tue, 12 Mar 2019 11:01:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Et8KYC8i; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728004AbfCLRNi (ORCPT + 99 others); Tue, 12 Mar 2019 13:13:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:49150 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727729AbfCLRNA (ORCPT ); Tue, 12 Mar 2019 13:13:00 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 71B68217D8; Tue, 12 Mar 2019 17:12:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410779; bh=vaXsUTiMOIwrHWMD2cdyVlOooVZ2dFzJjx8fPR14UIU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Et8KYC8ibV3BFfafHe/ZsEhzGqzrpL7EuwnPU6sE+5bLkjvSwCT/9gii0bjc4PV39 Olc+syInomk8BvmdEDJuvHZi5TC0yEATUqVM8h5sMd/3tc0CMtKZC+mCNbF8soPkRc gjHZVKBGbUuXBnhtdP973VAuHEeY5SvnXfogSzJw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yan Fu , Stefano Garzarella , Stefan Hajnoczi , "David S. Miller" , Sasha Levin Subject: [PATCH 4.20 119/171] vsock/virtio: fix kernel panic after device hot-unplug Date: Tue, 12 Mar 2019 10:08:19 -0700 Message-Id: <20190312170358.095580123@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170347.868927101@linuxfoundation.org> References: <20190312170347.868927101@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 22b5c0b63f32568e130fa2df4ba23efce3eb495b ] virtio_vsock_remove() invokes the vsock_core_exit() also if there are opened sockets for the AF_VSOCK protocol family. In this way the vsock "transport" pointer is set to NULL, triggering the kernel panic at the first socket activity. This patch move the vsock_core_init()/vsock_core_exit() in the virtio_vsock respectively in module_init and module_exit functions, that cannot be invoked until there are open sockets. Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1609699 Reported-by: Yan Fu Signed-off-by: Stefano Garzarella Acked-by: Stefan Hajnoczi Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/vmw_vsock/virtio_transport.c | 26 ++++++++++++++++++-------- 1 file changed, 18 insertions(+), 8 deletions(-) diff --git a/net/vmw_vsock/virtio_transport.c b/net/vmw_vsock/virtio_transport.c index 5d3cce9e8744..9dae54698737 100644 --- a/net/vmw_vsock/virtio_transport.c +++ b/net/vmw_vsock/virtio_transport.c @@ -75,6 +75,9 @@ static u32 virtio_transport_get_local_cid(void) { struct virtio_vsock *vsock = virtio_vsock_get(); + if (!vsock) + return VMADDR_CID_ANY; + return vsock->guest_cid; } @@ -584,10 +587,6 @@ static int virtio_vsock_probe(struct virtio_device *vdev) virtio_vsock_update_guest_cid(vsock); - ret = vsock_core_init(&virtio_transport.transport); - if (ret < 0) - goto out_vqs; - vsock->rx_buf_nr = 0; vsock->rx_buf_max_nr = 0; atomic_set(&vsock->queued_replies, 0); @@ -618,8 +617,6 @@ static int virtio_vsock_probe(struct virtio_device *vdev) mutex_unlock(&the_virtio_vsock_mutex); return 0; -out_vqs: - vsock->vdev->config->del_vqs(vsock->vdev); out: kfree(vsock); mutex_unlock(&the_virtio_vsock_mutex); @@ -669,7 +666,6 @@ static void virtio_vsock_remove(struct virtio_device *vdev) mutex_lock(&the_virtio_vsock_mutex); the_virtio_vsock = NULL; - vsock_core_exit(); mutex_unlock(&the_virtio_vsock_mutex); vdev->config->del_vqs(vdev); @@ -702,14 +698,28 @@ static int __init virtio_vsock_init(void) virtio_vsock_workqueue = alloc_workqueue("virtio_vsock", 0, 0); if (!virtio_vsock_workqueue) return -ENOMEM; + ret = register_virtio_driver(&virtio_vsock_driver); if (ret) - destroy_workqueue(virtio_vsock_workqueue); + goto out_wq; + + ret = vsock_core_init(&virtio_transport.transport); + if (ret) + goto out_vdr; + + return 0; + +out_vdr: + unregister_virtio_driver(&virtio_vsock_driver); +out_wq: + destroy_workqueue(virtio_vsock_workqueue); return ret; + } static void __exit virtio_vsock_exit(void) { + vsock_core_exit(); unregister_virtio_driver(&virtio_vsock_driver); destroy_workqueue(virtio_vsock_workqueue); } -- 2.19.1