From nobody Sat Apr 4 01:33:07 2026 Received: from mail-dl1-f73.google.com (mail-dl1-f73.google.com [74.125.82.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5D2EC34B1A8 for ; Sun, 22 Mar 2026 05:43:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.82.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774158204; cv=none; b=Hxaf/W86X8MWh31v9C8g2ZQ0vyhVMJl7+9wzcbU731fhOmjCJw2OTEf8nY/BaA5hwOK5wT4fOVD5JRz9+V0OnscFqrwWvAK+LDXnpyywTWsuy1yxnvl+3/gwkiRjjJ4oEKp77faRhd1tKg1wKWt5nHYhaLKpS7jIfn2tiZ1FBsI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774158204; c=relaxed/simple; bh=pUtFLNM8bIVhn1C4HEgCXPw2t6WuvF6D4DtWrOoUcZE=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=uoEb1L1/zoGBOfzKQEcpZS9VLl4TDc7QN2rFhzzLMZcTvWWlZQ4nqhPwzBKEw7jTMOcKKxHR66SqwGLGYVk86qpmXrDNzhiHP/yxFaA9UZXifXmvVSL4oVzoX5K2KGfDBHfzJbIoOIqAMQvepTHGCORIzJepes3WO5+9TaVKeto= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--surenb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=QLdApo9d; arc=none smtp.client-ip=74.125.82.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--surenb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="QLdApo9d" Received: by mail-dl1-f73.google.com with SMTP id a92af1059eb24-127337c8e52so16082483c88.1 for ; Sat, 21 Mar 2026 22:43:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1774158199; x=1774762999; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=GvTHfHDaEeYEd5IaJalf0yvJB887/iPHMmYQM447rIU=; b=QLdApo9dPCkZ+nxKcg5Yf4uSU8WqNlWQwJZqkLijWO2ayLb557eRaVtf8M+4svxnDt gMfeiZKU2TgKgkFmIKiuuzv8ISdqLw/++zLdsVdUjgBaqMO7TGwVB1QPRXSamF/q9owj s+BvOX1ACKPySBYqQK5+KRMzYQy+gmCMebvzqaytVSimWlv9oTbzHxewTQRu16UMVsTs 40gUmFPy7ML+DU3AVFs2vJymMhH+TRiMXuVMVpqMXN1WjWI57Lyyyyby69ehc1Kk/4no 90/AQ2hbPtG/FZmJaG7Zts7euL9CHTsb+JXwLV5EYYsb1zvRxWRs4OckOvbpGaSLDj8A Mjmg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1774158199; x=1774762999; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=GvTHfHDaEeYEd5IaJalf0yvJB887/iPHMmYQM447rIU=; b=KhELwxOlc1pBh2hFVxqUKJA50+c0jR4L3MTBHb3t6dSF3kpPQgrgAlqCcE3jhppZnz rwBW8TEYpZgyo5UA4lKOiczR/BYABww6UBifkAuzUDhvJm82CMmq0EPvV1WuMp5fDUJt 4L0ClEBKa8PxVaHiUuBliAATjh88AXWCTUkaO2sAI5MSwnUzykoJ6km6+uY46rwMUqZk m2Fg7iI5seBUhYAuce+2fe4Ik1z2zM5R94kYvkziXwRXPa70f1NKbfR78voFYZ1or1+e jUTrUiJjodCy16Dcc/VoC51vLDUFIxxdY+F6xAKO3zLlJJ5Tf4NVoeyfoNmzPBctlM0e SlWg== X-Forwarded-Encrypted: i=1; AJvYcCWxYwQT9HqbBsjDML++FP0H77xH+bLpT6SLpMkObuJ6igfim+vPFojmikmjx1qnjNSbSzWGVSx33RLcF7w=@vger.kernel.org X-Gm-Message-State: AOJu0YyRCfhxCMhX6iO20UUmgEe06Fta2G91vgs6M5f8AP/ruzKcuUpt IH6qpdnCiSFYUeh4SeXBSvg6tilcn87dAD9/ZuRFoFKuBclyOyOO/SXunCnxS1lpf/rK0CGURQs 5DLwmWQ== X-Received: from dlbvg27.prod.google.com ([2002:a05:7022:7f1b:b0:128:d754:39d]) (user=surenb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:7022:41a8:b0:127:33e0:ea33 with SMTP id a92af1059eb24-12a726b3177mr4054533c88.22.1774158199330; Sat, 21 Mar 2026 22:43:19 -0700 (PDT) Date: Sat, 21 Mar 2026 22:43:07 -0700 In-Reply-To: <20260322054309.898214-1-surenb@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20260322054309.898214-1-surenb@google.com> X-Mailer: git-send-email 2.53.0.1018.g2bb0e51243-goog Message-ID: <20260322054309.898214-4-surenb@google.com> Subject: [PATCH v4 3/4] KVM: s390: avoid kvm_s390_handle_pv() error overwrite From: Suren Baghdasaryan To: akpm@linux-foundation.org Cc: willy@infradead.org, david@kernel.org, ziy@nvidia.com, matthew.brost@intel.com, joshua.hahnjy@gmail.com, rakie.kim@sk.com, byungchul@sk.com, gourry@gourry.net, ying.huang@linux.alibaba.com, apopple@nvidia.com, lorenzo.stoakes@oracle.com, baolin.wang@linux.alibaba.com, Liam.Howlett@oracle.com, npache@redhat.com, ryan.roberts@arm.com, dev.jain@arm.com, baohua@kernel.org, lance.yang@linux.dev, vbabka@suse.cz, jannh@google.com, rppt@kernel.org, mhocko@suse.com, pfalcato@suse.de, kees@kernel.org, maddy@linux.ibm.com, npiggin@gmail.com, mpe@ellerman.id.au, chleroy@kernel.org, borntraeger@linux.ibm.com, frankja@linux.ibm.com, imbrenda@linux.ibm.com, hca@linux.ibm.com, gor@linux.ibm.com, agordeev@linux.ibm.com, svens@linux.ibm.com, gerald.schaefer@linux.ibm.com, linux-mm@kvack.org, linuxppc-dev@lists.ozlabs.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, surenb@google.com Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" If kvm_s390_handle_pv() call fails its error code gets recorded but execution proceeds as if the call was successful. If the next call to copy_to_user() fails then the original error is overwritten. The follow-up patch adds fatal signal checks during VMA walk, which makes it possible for kvm_s390_handle_pv() to return EINTR error. Without this fix any error including EINTR can be overwritten and original error will be lost. Change error handling for kvm_s390_handle_pv() to alter normal flow once failure happens. This is consistent with how kvm_arch_vm_ioctl handles errors for other ioctl commands. Signed-off-by: Suren Baghdasaryan --- arch/s390/kvm/kvm-s390.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c index 3eb60aa932ec..ddad08c0926f 100644 --- a/arch/s390/kvm/kvm-s390.c +++ b/arch/s390/kvm/kvm-s390.c @@ -2947,6 +2947,8 @@ int kvm_arch_vm_ioctl(struct file *filp, unsigned int= ioctl, unsigned long arg) } /* must be called without kvm->lock */ r =3D kvm_s390_handle_pv(kvm, &args); + if (r) + break; if (copy_to_user(argp, &args, sizeof(args))) { r =3D -EFAULT; break; --=20 2.53.0.1018.g2bb0e51243-goog