From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934213AbeALQqM (ORCPT + 1 other); Fri, 12 Jan 2018 11:46:12 -0500 Received: from mail-pg0-f67.google.com ([74.125.83.67]:40819 "EHLO mail-pg0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934027AbeALQqJ (ORCPT ); Fri, 12 Jan 2018 11:46:09 -0500 X-Google-Smtp-Source: ACJfBosflWlQZDbrQq87rGgbsRw3plooZOoNI9JGOeJrYGrhwnyVwaDiNt7XhOvSNqG0CMA2ER7Dtg== Message-ID: <1515775567.131759.42.camel@gmail.com> Subject: Re: [PATCH] net/mlx4_en: ensure rx_desc updating reaches HW before prod db updating From: Eric Dumazet To: Jason Gunthorpe , Jianchao Wang Cc: tariqt@mellanox.com, junxiao.bi@oracle.com, netdev@vger.kernel.org, linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org, Saeed Mahameed Date: Fri, 12 Jan 2018 08:46:07 -0800 In-Reply-To: <20180112163247.GB15974@ziepe.ca> References: <1515728542-3060-1-git-send-email-jianchao.w.wang@oracle.com> <20180112163247.GB15974@ziepe.ca> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Fri, 2018-01-12 at 09:32 -0700, Jason Gunthorpe wrote: > On Fri, Jan 12, 2018 at 11:42:22AM +0800, Jianchao Wang wrote: > > Customer reported memory corruption issue on previous mlx4_en driver > > version where the order-3 pages and multiple page reference counting > > were still used. > > > > Finally, find out one of the root causes is that the HW may see stale > > rx_descs due to prod db updating reaches HW before rx_desc. Especially > > when cross order-3 pages boundary and update a new one, HW may write > > on the pages which may has been freed and allocated again by others. > > > > To fix it, add a wmb between rx_desc and prod db updating to ensure > > the order. Even thougth order-0 and page recycling has been introduced, > > the disorder between rx_desc and prod db still could lead to corruption > > on different inbound packages. > > > > Signed-off-by: Jianchao Wang > > drivers/net/ethernet/mellanox/mlx4/en_rx.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/drivers/net/ethernet/mellanox/mlx4/en_rx.c b/drivers/net/ethernet/mellanox/mlx4/en_rx.c > > index 85e28ef..eefa82c 100644 > > +++ b/drivers/net/ethernet/mellanox/mlx4/en_rx.c > > @@ -555,7 +555,7 @@ static void mlx4_en_refill_rx_buffers(struct mlx4_en_priv *priv, > > break; > > ring->prod++; > > } while (likely(--missing)); > > - > > + wmb(); /* ensure rx_desc updating reaches HW before prod db updating */ > > mlx4_en_update_rx_prod_db(ring); > > } > > > > Does this need to be dma_wmb(), and should it be in > mlx4_en_update_rx_prod_db ? > +1 on dma_wmb() On what architecture bug was observed ? In any case, the barrier should be moved in mlx4_en_update_rx_prod_db() I think.