Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp7756255ybi; Thu, 6 Jun 2019 00:42:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqwCE//TOqFmgt8ucZ2Wz/VSgDr0ued1N2VVBcq5M0ObpC+M80E5QeePp0a/zEiLGeJyutDH X-Received: by 2002:a62:f201:: with SMTP id m1mr45128455pfh.217.1559806971126; Thu, 06 Jun 2019 00:42:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559806971; cv=none; d=google.com; s=arc-20160816; b=fSrniWNkgVeWkDbSWFaamMsUgd0EQohDU/ur30g77LfowHX2lR4iCoRVVwiRdY7pTm 2GzBpaAVMyKDkTScHLIL3Kb+2wU7hXzsynKjU7LuXX3tmCDm/R7FyopPCMTK179WUfs8 ytAvJeqNaeCYsdpVTIxSWE9/YrBjuh0BY0yHUXtv3el2BsxJzh1nEAMvFc6WHDnjdlvF JN/bWdYEPuI/Y6fi807LWUmUseQbMSSf/UHop7sc3hUx+0hoR3VzIe9mGeUJi/OvugUz hzgcmsGBHgnoe0S/8Xi+Qvo/Ses74OwJ3466YzE78HTFmWwDmHOF2SnnBlBmceAM2qxY 2Glw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=VzMAixAeMB8jr04BGajibNUG4mwKKhAf3rl5P8/7w98=; b=gWeB3yWiRz7dGyuInN/6ea1dutYkl1XfpMIACyBZI5eVSZ60KgkDe8IiUH/90g9vkY WDR8gRA9ueUa3U1Yme9k/HrCW6g+N9tropOXlU0MV3XhLEdj++9/Gd2uKSWhU/+whsYi QV1uGCqGdqCyDFtX5lZY/qGbnbWWQh0CGtwvcdZvDZ46BoqX2ia9N5+Y+t6F+C1d3AUy NGNzBs8SLVOYJqFXqkH2Z8Ql29HNCoJ0K29harSleVuuUd+4wG8w9CQf33sXgpCTnV+b 3feWOZhJbEsNfJJTSJhTfYOjbe+MUP9RO5RGGMTgpCOHxNpyz/w04fDUZcsGQQDgJTBb ICBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a20si1176858pju.92.2019.06.06.00.42.34; Thu, 06 Jun 2019 00:42:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726092AbfFFHlY (ORCPT + 99 others); Thu, 6 Jun 2019 03:41:24 -0400 Received: from mx1.redhat.com ([209.132.183.28]:54228 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725267AbfFFHlX (ORCPT ); Thu, 6 Jun 2019 03:41:23 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 73A11C04FFF1; Thu, 6 Jun 2019 07:41:23 +0000 (UTC) Received: from sirius.home.kraxel.org (ovpn-117-131.ams2.redhat.com [10.36.117.131]) by smtp.corp.redhat.com (Postfix) with ESMTP id 233192E040; Thu, 6 Jun 2019 07:41:23 +0000 (UTC) Received: by sirius.home.kraxel.org (Postfix, from userid 1000) id 637F511AAF; Thu, 6 Jun 2019 09:41:22 +0200 (CEST) Date: Thu, 6 Jun 2019 09:41:22 +0200 From: Gerd Hoffmann To: davidriley@chromium.org Cc: dri-devel@lists.freedesktop.org, virtualization@lists.linux-foundation.org, David Airlie , Daniel Vetter , linux-kernel@vger.kernel.org Subject: Re: [PATCH 4/4] drm/virtio: Add memory barriers for capset cache. Message-ID: <20190606074122.csocqu6g3in7dgbj@sirius.home.kraxel.org> References: <20190605234423.11348-1-davidriley@chromium.org> <20190605234423.11348-4-davidriley@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190605234423.11348-4-davidriley@chromium.org> User-Agent: NeoMutt/20180716 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Thu, 06 Jun 2019 07:41:23 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 05, 2019 at 04:44:23PM -0700, davidriley@chromium.org wrote: > From: David Riley > > After data is copied to the cache entry, atomic_set is used indicate > that the data is the entry is valid without appropriate memory barriers. > Similarly the read side was missing the same memory barries. > > Signed-off-by: David Riley > --- > drivers/gpu/drm/virtio/virtgpu_ioctl.c | 3 +++ > drivers/gpu/drm/virtio/virtgpu_vq.c | 2 ++ > 2 files changed, 5 insertions(+) > > diff --git a/drivers/gpu/drm/virtio/virtgpu_ioctl.c b/drivers/gpu/drm/virtio/virtgpu_ioctl.c > index 88c1ed57a3c5..502f5f7c2298 100644 > --- a/drivers/gpu/drm/virtio/virtgpu_ioctl.c > +++ b/drivers/gpu/drm/virtio/virtgpu_ioctl.c > @@ -542,6 +542,9 @@ static int virtio_gpu_get_caps_ioctl(struct drm_device *dev, > if (!ret) > return -EBUSY; > > + /* is_valid check must proceed before copy of the cache entry. */ > + virt_rmb(); I don't think you need virt_rmb() here. This isn't guest <=> host communication, so a normal barrier should do. The other three fixes are queued up for drm-misc-next. cheers, Gerd