Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp4588320pxb; Tue, 22 Feb 2022 01:58:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJxl4bJpucSInfLEXsRFFJNcACxpOXTSmZc/KE7rpK6HgGzy1R0LLGEPHEfTD+DWEJUg73WO X-Received: by 2002:a17:903:2303:b0:14d:5605:28d7 with SMTP id d3-20020a170903230300b0014d560528d7mr22042006plh.72.1645523916880; Tue, 22 Feb 2022 01:58:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645523916; cv=none; d=google.com; s=arc-20160816; b=LDQSrBtDwtNHgA4wBRhkael2nrvbIIfKrhrir+P8f7FrPzCa/z+qyTuUuZAZa0iCJi K3qn19NW14gRUL9TAg1+OUFq31zt7HMtl4L6E/4cC18uXry/3E/xJlb4BBsqtXl5/WcW T1LHhmp9zpLv+hxTjwS+9ozXb5d1ImnKd+GaBOPJmCGPGOHQjbMT1X1GO7u3L7Scr5hw sq/Q29xDE5qOtigFBAWJYRe3KHefrgGTC11utzsbk8EFaBeHvcSe3f6e/eELDu38OQfn clV7TQ3lFQ6sZbXAgUyEgzEY2h17myyl7cZqQN70kCfDaXVegCU0PnzeRBDoPi1dMD17 wbsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=1vLjaLOpjM/maPs9UeQipZMtimlrY+ZZDRN/XdiV3h8=; b=DZzHk9sttbcDZilzwwRbl/Z0mfNNpkQg3eog5ZxHPix3Q/Vem0DgMeZwvGIWvqfhQP TA3dYn5856QHepubnlQCXu4zsl7dQ1eAQN7o2EU8agMmKd6xK9NQ/ojA/+8lI2An2kPu /tYWG/hIyK7zSudk3IFBl41B7puJfhwKdtTkE3KNmjE+/nJZkockMI00yw4S0/KWGEt9 EgAZ3DuDIIJWMWbL1VhdZgJny1OVOikRFs40O3YEI3R30Al/mWojXDwwWnKFc058Xvxh v4xbhNETagAxS+HrgI2EvvhMYbcmPNXsFWlAVKXwVwZ4qSgWc75hiOmOmUgpD7mIj5wY Utkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="Knbw3/bK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z7si20666882pgu.763.2022.02.22.01.58.23; Tue, 22 Feb 2022 01:58:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="Knbw3/bK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230269AbiBVJsS (ORCPT + 99 others); Tue, 22 Feb 2022 04:48:18 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47426 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229520AbiBVJsQ (ORCPT ); Tue, 22 Feb 2022 04:48:16 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 959468D6B3 for ; Tue, 22 Feb 2022 01:47:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1645523270; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=1vLjaLOpjM/maPs9UeQipZMtimlrY+ZZDRN/XdiV3h8=; b=Knbw3/bKaoIBuKz66UMr7+P+g17yBXbfPJHB0VLaO0Jb/EXnjnlm4BaJfID92FWX36++4m v2GTrXoKUBG8kLBA/AxT4oV1ifGXRUNR4YIh/eAZCUMgwu/zoB0yslKFuutmZqBVpcMBBU z+d84i3FAX/9s1zWOPglfN4aUmqGaGE= Received: from mail-qv1-f69.google.com (mail-qv1-f69.google.com [209.85.219.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-534-7BQ_gvgmMv-_S4pEBYXqmA-1; Tue, 22 Feb 2022 04:47:49 -0500 X-MC-Unique: 7BQ_gvgmMv-_S4pEBYXqmA-1 Received: by mail-qv1-f69.google.com with SMTP id dc3-20020a056214174300b004323e681becso1814135qvb.11 for ; Tue, 22 Feb 2022 01:47:49 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=1vLjaLOpjM/maPs9UeQipZMtimlrY+ZZDRN/XdiV3h8=; b=drwTSiYz0WC4NHVZx0u0k4FkyIwO1/3fzYuPR24bvXuw5PYOnjNTZthVe1LHTr4DkZ 2M9rn3An4A80eT26ag3UOse+JExMjufiCqGBpuwhuf8tNdhnQamvT93D9RbgmiGI5oR1 y47loq3rS3vFe10DicdiEbhfrZT5ZSeayNvfQGxCMaw9ooF8cGoTEJsvxaypm9gX3UFz LIz45bRU9N3G4jqcQ5i26PaKGrXMmlEin3zUHz0P9Ve8jDZh4ODr/cws5OOTEDzRXo8P 57Wec3/F2mXNJC+oZ/T6papsLTP9nsgh4s4cP9TcBkwJIMloqqTT6rsGbLV2GHCiV0gb aN4g== X-Gm-Message-State: AOAM530K4SgG5+CrLPInXhI3TpTxbp3ERm7kMa73aaHXSLfKvAFtPPDP FOSBL/n4R9LW9h5L9WaWpxrVWYcGcEVcV3DTHrGNlvbtNhkJjzn/ws7FB5DGTHPXpQV7yhtxA2Z m/nFIRmMUeeF3vP7FVvdxf8Vx X-Received: by 2002:ac8:5f4c:0:b0:2d9:9327:1355 with SMTP id y12-20020ac85f4c000000b002d993271355mr21214798qta.518.1645523268797; Tue, 22 Feb 2022 01:47:48 -0800 (PST) X-Received: by 2002:ac8:5f4c:0:b0:2d9:9327:1355 with SMTP id y12-20020ac85f4c000000b002d993271355mr21214790qta.518.1645523268571; Tue, 22 Feb 2022 01:47:48 -0800 (PST) Received: from step1.redhat.com (host-95-248-229-156.retail.telecomitalia.it. [95.248.229.156]) by smtp.gmail.com with ESMTPSA id br35sm27922533qkb.118.2022.02.22.01.47.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 22 Feb 2022 01:47:47 -0800 (PST) From: Stefano Garzarella To: "Michael S. Tsirkin" Cc: Stefan Hajnoczi , Jason Wang , netdev@vger.kernel.org, virtualization@lists.linux-foundation.org, Stefano Garzarella , syzbot+1e3ea63db39f2b4440e0@syzkaller.appspotmail.com, kvm@vger.kernel.org, Anirudh Rayabharam , syzbot+3140b17cb44a7b174008@syzkaller.appspotmail.com, linux-kernel@vger.kernel.org, Mike Christie , Dan Carpenter , stable@vger.kernel.org Subject: [PATCH v2] vhost/vsock: don't check owner in vhost_vsock_stop() while releasing Date: Tue, 22 Feb 2022 10:47:42 +0100 Message-Id: <20220222094742.16359-1-sgarzare@redhat.com> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org vhost_vsock_stop() calls vhost_dev_check_owner() to check the device ownership. It expects current->mm to be valid. vhost_vsock_stop() is also called by vhost_vsock_dev_release() when the user has not done close(), so when we are in do_exit(). In this case current->mm is invalid and we're releasing the device, so we should clean it anyway. Let's check the owner only when vhost_vsock_stop() is called by an ioctl. When invoked from release we can not fail so we don't check return code of vhost_vsock_stop(). We need to stop vsock even if it's not the owner. Fixes: 433fc58e6bf2 ("VSOCK: Introduce vhost_vsock.ko") Cc: stable@vger.kernel.org Reported-by: syzbot+1e3ea63db39f2b4440e0@syzkaller.appspotmail.com Reported-and-tested-by: syzbot+3140b17cb44a7b174008@syzkaller.appspotmail.com Signed-off-by: Stefano Garzarella --- v2: - initialized `ret` in vhost_vsock_stop [Dan] - added comment about vhost_vsock_stop() calling in the code and an explanation in the commit message [MST] v1: https://lore.kernel.org/virtualization/20220221114916.107045-1-sgarzare@redhat.com --- drivers/vhost/vsock.c | 21 ++++++++++++++------- 1 file changed, 14 insertions(+), 7 deletions(-) diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c index d6ca1c7ad513..37f0b4274113 100644 --- a/drivers/vhost/vsock.c +++ b/drivers/vhost/vsock.c @@ -629,16 +629,18 @@ static int vhost_vsock_start(struct vhost_vsock *vsock) return ret; } -static int vhost_vsock_stop(struct vhost_vsock *vsock) +static int vhost_vsock_stop(struct vhost_vsock *vsock, bool check_owner) { size_t i; - int ret; + int ret = 0; mutex_lock(&vsock->dev.mutex); - ret = vhost_dev_check_owner(&vsock->dev); - if (ret) - goto err; + if (check_owner) { + ret = vhost_dev_check_owner(&vsock->dev); + if (ret) + goto err; + } for (i = 0; i < ARRAY_SIZE(vsock->vqs); i++) { struct vhost_virtqueue *vq = &vsock->vqs[i]; @@ -753,7 +755,12 @@ static int vhost_vsock_dev_release(struct inode *inode, struct file *file) * inefficient. Room for improvement here. */ vsock_for_each_connected_socket(vhost_vsock_reset_orphans); - vhost_vsock_stop(vsock); + /* Don't check the owner, because we are in the release path, so we + * need to stop the vsock device in any case. + * vhost_vsock_stop() can not fail in this case, so we don't need to + * check the return code. + */ + vhost_vsock_stop(vsock, false); vhost_vsock_flush(vsock); vhost_dev_stop(&vsock->dev); @@ -868,7 +875,7 @@ static long vhost_vsock_dev_ioctl(struct file *f, unsigned int ioctl, if (start) return vhost_vsock_start(vsock); else - return vhost_vsock_stop(vsock); + return vhost_vsock_stop(vsock, true); case VHOST_GET_FEATURES: features = VHOST_VSOCK_FEATURES; if (copy_to_user(argp, &features, sizeof(features))) -- 2.35.1