Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp1001050pxb; Wed, 1 Sep 2021 14:59:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy37G7yvACJmFLIyLnaSh5xdaIqBIh3vyePbOPE8JozWghKXNy72lKfVEJ47nJV242NJPsN X-Received: by 2002:a17:907:7704:: with SMTP id kw4mr592ejc.23.1630533593631; Wed, 01 Sep 2021 14:59:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630533593; cv=none; d=google.com; s=arc-20160816; b=wDWk3u0UyM6UzEO+rSDyV0G2xSXp2COHCYKqVnP11xBfuwmwjl6SdlpR2AGPuFul5l y6XEIa3nRmXl/JhNORLGOCNYbGDsQ26Gz0PQuKXhrxTXTV/tTg4tchXzYZYI8KMwwPI+ XXwqUsBdHHzTeRC8zMdxKYsNENCy2XEQmx69RV7wiXhCOtTjJ5aXxKES9hZ3wgBOOoda Ln+tmFU5ObwshGE6OSRyBpxNAQbzT+weezr3KEqt1P9ZP7dlpYBmIj3AnVmVWmA2BgWI QGU45PbNBtu1S+jTVi+JVuZ8u/s7xik7E0WvX14iAlX/fmB0h4qHrxd2mF/SNKWrZJs4 S5Lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=z7f/cbb1ZX7cvdTcuDtaK1awuB/GKELJI5gSdo4xnEE=; b=PG1z5PHsDXzwYPZbCrADXLp546uO5TSFKIlvUtz+gfqpxVGBAMMQ8mT58ojSitVweP VGBVBt6DHXb6G9llzCbhRQ19oAqHfcadtLfs+BPTQRVyxkYnypps3MEJvxXEMXld4Ttn h5qgzGcDWwjm4NkewZNtOjLVxcBLMgSgAkYwM8hpWYFkYP5eAYLpBr2ZAk5b8YJUIk1V CZO1+8qeK8H4FSIV+oGaceRPPI8k0BO5OuXe6pUiIEEorBCc5IFSZd33QIaCv2CWrF93 E6tZuBqH42/M4aPKPZlGzD+eyuuBgwPugkvhvJbFwcRro8xHdNKpQyeEbHCMgfJuzXVl 5Z0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=WFRNqXg+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id js15si1098554ejc.135.2021.09.01.14.59.30; Wed, 01 Sep 2021 14:59:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=WFRNqXg+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245001AbhIAMcI (ORCPT + 99 others); Wed, 1 Sep 2021 08:32:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:32780 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244831AbhIAMbW (ORCPT ); Wed, 1 Sep 2021 08:31:22 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6B718610A4; Wed, 1 Sep 2021 12:30:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1630499426; bh=nlhbgY7JlbZUUHfACAanG1o0XxU/k6vH9k9y4N0S8zY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=WFRNqXg+Kws3msJ2trM7HiRWESm3Tkd7vZnWMuFygO1XtAYXnxBOS7LGcEPyojIA+ ggqKrp6BUMs9egQ+KrpJb93kikoV3VMP+iCT/ZiNt19uFHItmXGvb2mSdohRhB0iBs LVQI1ITbwANsOtFaviNJhAk1WMZwQL1BxR6PuwI8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Parav Pandit , "Michael S. Tsirkin" , Sasha Levin Subject: [PATCH 4.19 21/33] virtio: Improve vq->broken access to avoid any compiler optimization Date: Wed, 1 Sep 2021 14:28:10 +0200 Message-Id: <20210901122251.490479445@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210901122250.752620302@linuxfoundation.org> References: <20210901122250.752620302@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Parav Pandit [ Upstream commit 60f0779862e4ab943810187752c462e85f5fa371 ] Currently vq->broken field is read by virtqueue_is_broken() in busy loop in one context by virtnet_send_command(). vq->broken is set to true in other process context by virtio_break_device(). Reader and writer are accessing it without any synchronization. This may lead to a compiler optimization which may result to optimize reading vq->broken only once. Hence, force reading vq->broken on each invocation of virtqueue_is_broken() and also force writing it so that such update is visible to the readers. It is a theoretical fix that isn't yet encountered in the field. Signed-off-by: Parav Pandit Link: https://lore.kernel.org/r/20210721142648.1525924-2-parav@nvidia.com Signed-off-by: Michael S. Tsirkin Signed-off-by: Sasha Levin --- drivers/virtio/virtio_ring.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c index df7980aef927..0cc0cfd3a3cb 100644 --- a/drivers/virtio/virtio_ring.c +++ b/drivers/virtio/virtio_ring.c @@ -1197,7 +1197,7 @@ bool virtqueue_is_broken(struct virtqueue *_vq) { struct vring_virtqueue *vq = to_vvq(_vq); - return vq->broken; + return READ_ONCE(vq->broken); } EXPORT_SYMBOL_GPL(virtqueue_is_broken); @@ -1211,7 +1211,9 @@ void virtio_break_device(struct virtio_device *dev) list_for_each_entry(_vq, &dev->vqs, list) { struct vring_virtqueue *vq = to_vvq(_vq); - vq->broken = true; + + /* Pairs with READ_ONCE() in virtqueue_is_broken(). */ + WRITE_ONCE(vq->broken, true); } } EXPORT_SYMBOL_GPL(virtio_break_device); -- 2.30.2