Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp789272ybe; Fri, 13 Sep 2019 06:25:17 -0700 (PDT) X-Google-Smtp-Source: APXvYqymN4iyyoudWPk5Tn/oCg2GWmz3aPeuvUXUkvzjOzaMPIY/+Ex2xJzZUrnc4rBhcNv+TmVm X-Received: by 2002:aa7:c1d4:: with SMTP id d20mr1711980edp.223.1568381117689; Fri, 13 Sep 2019 06:25:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568381117; cv=none; d=google.com; s=arc-20160816; b=xHWZIpGAlvaiklYUfv8NtvzdVlBu6fEFbdIfO4c0JgjSBGctnz7IdQSzHFxAddWLRi Lq0fmxdjuAhKscooCN4mPkZMX7zy+iF2uIcuBZCVu+7GIS+m+nOEvLuHYJMUpjeodgEF fVIfnFtqy4jQrLA0YAVKRMnbRpOJ7S3yNuZw1JlN2s6iSZDGHOroilRL8ReyI/Zz6bz4 /tbucSjfuEA6Ke2jVdG6TBl+zwYcCw7c5J3LIxCEwst9rZCWvrPTw9B4LxHxfpYQh7EK x1qvlNZCu7KOUS9gDe4vyqd3E/fFyHp5c7op3FjJRthtEbacZOi3qjA1vaGUCPzF0uRu X3Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cDsip9eP33po6GHhLKYTN/nEb9WaeFXfujFmt8TxnMA=; b=WSi7kwSl+HARl/oN0LiSePg3qpUeJLE6hmH7vVhOsLFd87908WuN73V5W8LyP4G8Q2 Qrt/F81LIVKSI3FTrn1cJsbDn7Ay9AxQKnVisY8Tizi83e+/QRu7oDumJ/7Z3/aOID/v vty2E/oDu/wMRu6o0axLN/NAzEHbtwU6N+G3O8/Zn5wOqTmEH0JU5XZjZfcwbDX3Nwnx 7yTTnVzZ9oJyhpur+755unnLAE5bJ/PMhpV99e2t66qnhYHF/uP0+B+Cjdd9JR5mR2dA uXEgnElqLABqyoyUR8C0WqVpObROWT+WimGA6Qh105jTjEyWTCUHgdu5SgXmFAVGn+G5 NNDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MAhiJ8Sg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g13si14746647ejw.269.2019.09.13.06.24.52; Fri, 13 Sep 2019 06:25:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MAhiJ8Sg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389574AbfIMNUD (ORCPT + 99 others); Fri, 13 Sep 2019 09:20:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:48576 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390494AbfIMNUB (ORCPT ); Fri, 13 Sep 2019 09:20:01 -0400 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EC2ED214AE; Fri, 13 Sep 2019 13:19:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568380800; bh=F7CPsP0DETjCuTVbwrRUmgO6KsZwrVnOEzg5ONY7Sds=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MAhiJ8SgMXkAjeNcOA9t9aVA6WiJdWTeVF2OO57olw/IApc97PKbTKMc//OsvpcDF 9ocrgqz93soWZa14It4jRypVk/dJriluiW1i9foY04zJUdUWAQ2d2CNZPoWAP1V/kx KkxczANcMMPEO7SwLNzoUyLMFBZzm4SJArRrxWl8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Halil Pasic , Marc Hartmayer , Cornelia Huck , Heiko Carstens , Sasha Levin Subject: [PATCH 4.19 181/190] virtio/s390: fix race on airq_areas[] Date: Fri, 13 Sep 2019 14:07:16 +0100 Message-Id: <20190913130614.291938973@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190913130559.669563815@linuxfoundation.org> References: <20190913130559.669563815@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 4f419eb14272e0698e8c55bb5f3f266cc2a21c81 ] The access to airq_areas was racy ever since the adapter interrupts got introduced to virtio-ccw, but since commit 39c7dcb15892 ("virtio/s390: make airq summary indicators DMA") this became an issue in practice as well. Namely before that commit the airq_info that got overwritten was still functional. After that commit however the two infos share a summary_indicator, which aggravates the situation. Which means auto-online mechanism occasionally hangs the boot with virtio_blk. Signed-off-by: Halil Pasic Reported-by: Marc Hartmayer Reviewed-by: Cornelia Huck Cc: stable@vger.kernel.org Fixes: 96b14536d935 ("virtio-ccw: virtio-ccw adapter interrupt support.") Signed-off-by: Heiko Carstens Signed-off-by: Sasha Levin --- drivers/s390/virtio/virtio_ccw.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/s390/virtio/virtio_ccw.c b/drivers/s390/virtio/virtio_ccw.c index ec54538f7ae1c..67efdf25657f3 100644 --- a/drivers/s390/virtio/virtio_ccw.c +++ b/drivers/s390/virtio/virtio_ccw.c @@ -132,6 +132,7 @@ struct airq_info { struct airq_iv *aiv; }; static struct airq_info *airq_areas[MAX_AIRQ_AREAS]; +static DEFINE_MUTEX(airq_areas_lock); #define CCW_CMD_SET_VQ 0x13 #define CCW_CMD_VDEV_RESET 0x33 @@ -244,9 +245,11 @@ static unsigned long get_airq_indicator(struct virtqueue *vqs[], int nvqs, unsigned long bit, flags; for (i = 0; i < MAX_AIRQ_AREAS && !indicator_addr; i++) { + mutex_lock(&airq_areas_lock); if (!airq_areas[i]) airq_areas[i] = new_airq_info(); info = airq_areas[i]; + mutex_unlock(&airq_areas_lock); if (!info) return 0; write_lock_irqsave(&info->lock, flags); -- 2.20.1