Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp6553153ybx; Mon, 11 Nov 2019 10:50:51 -0800 (PST) X-Google-Smtp-Source: APXvYqx7wNVmtqVdNapMel6FYmfnXgm8MJ9j+kiJDe8Iyk3urjUDuJHh205znuz9CmKjdDqUHWPL X-Received: by 2002:aa7:d6cf:: with SMTP id x15mr28270502edr.202.1573498251099; Mon, 11 Nov 2019 10:50:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573498251; cv=none; d=google.com; s=arc-20160816; b=W1ecBN4SRqa09U8n0yf5mCA7UK+frH44mxQ3NQWO0MIWMgbm4BvykX/JoCkRVgxXB7 JUI5EY7vyLbl2vo0ZN9t80J9kWBYjFyIoWsaZYY/CNDQo1T/8rGzxGMUC05iq8bpn6tg LRzTwf5U4RvsIk1FCXm9pbPjcPDamgIxaM3rsTPa74zEkn9RBpNdXOG6hd9zQe7I4T1s P5O5P9Wc2S7UC3+G3YY3CQgjJwDK4VR0SR/CHY5TU365OPZVSeqfIT885QOtgRcd0Yad b1vmRvfoNNQeDl/R+29BM5Gv4n/Y+QAODRl9I5Q57ZtMmsNIcm3p/F3ExrG+H+RpH4SQ UT9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tQS+vtWMu4mgks714567qfF3PtcIynLMMuHSpjhp/HM=; b=miJ/cprp3rWlGTCMFGb57eDt2bkgRiZjbhCMn7G8xmS82b3commUa9MSfE1dXXTINX S35Hfn6xep34M9zk1tgRhkRT05IqXi+V80yGnGk17G+52ajKkjpDBuiBrOwA4a1ObT22 oZ+P2rfYJxv35BUe1p4NI2RZZySwCHd2v1PYyXKuSSbAptDmYPfFiPGdAAc+LEC8mIIT tmCkSkXFK23aJw+tgKjV1aaX2mNlYlSgStwKwxfP35cHYG+j0Jg4DU2hgqz+bbgANTFt 69ibG+W/5kROKHiyelUN+/NATi70NgVCedK3JjnK2T9Wx8uzeE55yMksoth+zP5yVscZ 7olQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ixVS5Joo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id um2si9838750ejb.64.2019.11.11.10.50.26; Mon, 11 Nov 2019 10:50:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ixVS5Joo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729744AbfKKSsR (ORCPT + 99 others); Mon, 11 Nov 2019 13:48:17 -0500 Received: from mail.kernel.org ([198.145.29.99]:41290 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729395AbfKKSsP (ORCPT ); Mon, 11 Nov 2019 13:48:15 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 438FC21655; Mon, 11 Nov 2019 18:48:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573498094; bh=bmUt5fzlbHA27VEy5GRmCFjd3Hsjz9seJVCUPTXPoUo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ixVS5Joo9FGxB6YjqCUakrVU3q1A9e3T3kO7zl9XrE4hcaqs/kYXHItsJtOLlGwIY 4k8DGJtJkNvX99U9ms+Ljf00ROa8rnEVe//myRMYtFmboUrdRUDACIDTGltFRGTRtO lGVxnSjO/2hFq2aZH0xxH651mKtYZjkga5NOM7z0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , Deepa Dinamani , "David S. Miller" Subject: [PATCH 5.3 020/193] net: prevent load/store tearing on sk->sk_stamp Date: Mon, 11 Nov 2019 19:26:42 +0100 Message-Id: <20191111181501.651927021@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191111181459.850623879@linuxfoundation.org> References: <20191111181459.850623879@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Dumazet [ Upstream commit f75359f3ac855940c5718af10ba089b8977bf339 ] Add a couple of READ_ONCE() and WRITE_ONCE() to prevent load-tearing and store-tearing in sock_read_timestamp() and sock_write_timestamp() This might prevent another KCSAN report. Fixes: 3a0ed3e96197 ("sock: Make sock->sk_stamp thread-safe") Signed-off-by: Eric Dumazet Cc: Deepa Dinamani Acked-by: Deepa Dinamani Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/net/sock.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/include/net/sock.h +++ b/include/net/sock.h @@ -2331,7 +2331,7 @@ static inline ktime_t sock_read_timestam return kt; #else - return sk->sk_stamp; + return READ_ONCE(sk->sk_stamp); #endif } @@ -2342,7 +2342,7 @@ static inline void sock_write_timestamp( sk->sk_stamp = kt; write_sequnlock(&sk->sk_stamp_seq); #else - sk->sk_stamp = kt; + WRITE_ONCE(sk->sk_stamp, kt); #endif }