Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp610641ybl; Fri, 24 Jan 2020 06:24:17 -0800 (PST) X-Google-Smtp-Source: APXvYqxFDJEcK322UEGRet7WR0KRF2jfhzxRnTNpF8XMpMR6epKvI0GmKo9Qe5D+cWfYRzUVFW5D X-Received: by 2002:aca:1011:: with SMTP id 17mr2192720oiq.72.1579875857083; Fri, 24 Jan 2020 06:24:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579875857; cv=none; d=google.com; s=arc-20160816; b=dAU7/1jw1lF1VqUl0dVG3ryRegDgn0LSxJ1IcMTyaZ3ChEjurjWBWvZzjm4Rc3N7Tw 2Tkv/wNgovP8oTU7EFDUfkzqPvyF+uIvdS7hxidgdw1bD5G/BKnsODACphtcDMswSrcw EFR9AtAY3aOKenxeee+AyvQJ8OGVpkzznIkzrfKe1kWkC50VrYplF9dDP01z+YLZGbsV 6kf2u0MAOb8p5KquDoLc+ju8FSMeUPcqkbcjna46w+q7iBSvspk4sBWqcYKei7TQ9v0D UeAV0dYIZcbwvGXVQHH0SAefEuCHn/236EdKIBYmSLphF76k2IdqTNVUTc7X6w/sB1fs J0jA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=g5UG7ZuXvlqcBmGCLyMqW02YE1cmBZUu4JMqxTKBEo0=; b=VMC+DzvFnp/kryyBgIWt1wvDlodlRFzqdNN3mUjPgGnRuanY+ZI3On4MxFkFuG7oqx 3zg/X//P4SYVwJfSXdS8FA0mgNQEnQvE60++H9zCLziO9e1SG8cYvIXXHf/3Zt6gNHC3 ObfsjiDcL9DCyK4oV65vNdf19HFvQ23cY+E0r9vsPeEz+sO2vwLJGXCABj/MpexWa5PT ACHQGaVeKDwA83kx2tlsbrfBXDHhyypWzbv2Un8tOHzp2AMUYIWkmHeOacjhrAxZyLEm JpnnLj3hUWYUyzPTJ3vCdWvdC96QJXpJMvZ+OeAsaD1Ut3xd/jrEjCpSt4fDDwqtc1gI 5Bmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GjeSKMai; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9si3017957otf.81.2020.01.24.06.24.04; Fri, 24 Jan 2020 06:24:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GjeSKMai; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389755AbgAXLJP (ORCPT + 99 others); Fri, 24 Jan 2020 06:09:15 -0500 Received: from mail.kernel.org ([198.145.29.99]:44746 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729188AbgAXLJN (ORCPT ); Fri, 24 Jan 2020 06:09:13 -0500 Received: from localhost (ip-213-127-102-57.ip.prioritytelecom.net [213.127.102.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C9B8820708; Fri, 24 Jan 2020 11:09:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579864152; bh=LcaHQk7HlJHcJORtK8v+0Ss5+sdO4zXKEWyscC+SkXA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GjeSKMaiuMTtPmCQK9fp72XcOrJcsI9m118pwPCbKMLYE/Gt5E6tW7nNGzef30AWF WRAPPv0sqXwqhB43Tl1P1jTqsggkahOBKbx1r9aFYYe3+vBrgoRkfEPS2YixxIeDRg Qz33O8lMSIwhqvv37/vRmGL66ihMO+keujgnHx/s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Magnus Karlsson , Alexei Starovoitov , Sasha Levin Subject: [PATCH 4.19 186/639] xsk: add missing smp_rmb() in xsk_mmap Date: Fri, 24 Jan 2020 10:25:56 +0100 Message-Id: <20200124093110.430156249@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124093047.008739095@linuxfoundation.org> References: <20200124093047.008739095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Magnus Karlsson [ Upstream commit e6762c8bcf982821935a2b1cb33cf8335d0eefae ] All the setup code in AF_XDP is protected by a mutex with the exception of the mmap code that cannot use it. To make sure that a process banging on the mmap call at the same time as another process is setting up the socket, smp_wmb() calls were added in the umem registration code and the queue creation code, so that the published structures that xsk_mmap needs would be consistent. However, the corresponding smp_rmb() calls were not added to the xsk_mmap code. This patch adds these calls. Fixes: 37b076933a8e3 ("xsk: add missing write- and data-dependency barrier") Fixes: c0c77d8fb787c ("xsk: add user memory registration support sockopt") Signed-off-by: Magnus Karlsson Signed-off-by: Alexei Starovoitov Signed-off-by: Sasha Levin --- net/xdp/xsk.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/xdp/xsk.c b/net/xdp/xsk.c index ff15207036dc5..547fc4554b22c 100644 --- a/net/xdp/xsk.c +++ b/net/xdp/xsk.c @@ -661,6 +661,8 @@ static int xsk_mmap(struct file *file, struct socket *sock, if (!umem) return -EINVAL; + /* Matches the smp_wmb() in XDP_UMEM_REG */ + smp_rmb(); if (offset == XDP_UMEM_PGOFF_FILL_RING) q = READ_ONCE(umem->fq); else if (offset == XDP_UMEM_PGOFF_COMPLETION_RING) @@ -670,6 +672,8 @@ static int xsk_mmap(struct file *file, struct socket *sock, if (!q) return -EINVAL; + /* Matches the smp_wmb() in xsk_init_queue */ + smp_rmb(); qpg = virt_to_head_page(q->ring); if (size > (PAGE_SIZE << compound_order(qpg))) return -EINVAL; -- 2.20.1