Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1504794imm; Wed, 17 Oct 2018 22:30:41 -0700 (PDT) X-Google-Smtp-Source: ACcGV60mT/kfav4YnR9c+yV+mqM+mxK7jFTi7VgOw8XiJxk/gZ9K+EivJ/h/zKChIixSVPXwf6YY X-Received: by 2002:a63:ce56:: with SMTP id r22-v6mr26867549pgi.217.1539840641634; Wed, 17 Oct 2018 22:30:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539840641; cv=none; d=google.com; s=arc-20160816; b=GcvSp0/Rj+VR5naNXjwYJ9spqkpQpB1+WA/T7lUlK52t1AZWiIeSgceDHEI7U8bNJ4 7gZuFPmNxoLFou3+jPsm0i5zPseKwQJy6kFHn33aVvVeOUDhxaU2wIGJSA81nWJKfd2m O5hhtZ+D+blQ1KSben09tVCEh/xt1SSrZzgF2jg2jWOsJaaNk9ztjmApnE6/ziNYAs+K SKHHm0oVvIHj7Lvc/cviGK4DWmf5r/2kKU9tUbhtPug8H0r793iDPrOO59M14Q0oy1y2 Hyxz1kysS7VXzG0Gp9KqsO0ofZ2lRMQLH4QTJcaaOxuXb3UWQ+GR4wzKkCoMT2Rm2Cli mfoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=VU843BMWttl998Myq7n98iF/pyVNI8l4EBvrK3FIyMA=; b=ERthj+5gPWIP1hPf3f01yzCeC79TfZvBuH7KKbXH1Fts4QXwUc99N8JRPz37Wp8apk Dq/cVqNhyCNLXzyXW+DyAhukH7vKVXwUQbiW2X7S2zPXTjfk5IiAQkciNeJD7RzXG+1X CTsHt+Qt2pLZL8XgPXhAMHuchK5pUpSLaYwuGBvcbM7GPS1/0xIVDQqkRRK3tJ91ectD OJ/dMRs1JD3oMbMUI5PKH13eONd8alT9Tddm4av+lNG1M6k8uG7d9LscvLgd9OPxR5Ur kcdBKNUDY80QflhvQQnS3BqOaKbsfSsZTKJzuCVus01L5XkiNJwyZSw7+8l5cbO4KGZ7 eNOw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a3-v6si18453156pgq.49.2018.10.17.22.30.25; Wed, 17 Oct 2018 22:30:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727519AbeJRN3Q (ORCPT + 99 others); Thu, 18 Oct 2018 09:29:16 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:55020 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727352AbeJRN3Q (ORCPT ); Thu, 18 Oct 2018 09:29:16 -0400 Received: from localhost (c-67-183-62-245.hsd1.wa.comcast.net [67.183.62.245]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 8B0B913AE209F; Wed, 17 Oct 2018 22:30:02 -0700 (PDT) Date: Wed, 17 Oct 2018 22:30:01 -0700 (PDT) Message-Id: <20181017.223001.1576138840071012489.davem@davemloft.net> To: ake@igel.co.jp Cc: jasowang@redhat.com, mst@redhat.com, virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3] virtio_net: avoid using netif_tx_disable() for serializing tx routine From: David Miller In-Reply-To: <20181017104419.13003-1-ake@igel.co.jp> References: <276ac5bb-90f7-5fb6-a826-0bb05ecfa069@redhat.com> <20181017104419.13003-1-ake@igel.co.jp> X-Mailer: Mew version 6.7 on Emacs 26 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 17 Oct 2018 22:30:02 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ake Koomsin Date: Wed, 17 Oct 2018 19:44:12 +0900 > Commit 713a98d90c5e ("virtio-net: serialize tx routine during reset") > introduces netif_tx_disable() after netif_device_detach() in order to > avoid use-after-free of tx queues. However, there are two issues. > > 1) Its operation is redundant with netif_device_detach() in case the > interface is running. > 2) In case of the interface is not running before suspending and > resuming, the tx does not get resumed by netif_device_attach(). > This results in losing network connectivity. > > It is better to use netif_tx_lock_bh()/netif_tx_unlock_bh() instead for > serializing tx routine during reset. This also preserves the symmetry > of netif_device_detach() and netif_device_attach(). > > Fixes commit 713a98d90c5e ("virtio-net: serialize tx routine during reset") > Signed-off-by: Ake Koomsin Applied and queued up for -stable.