[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160107210216.GA19334@amt.cnet>
Date: Thu, 7 Jan 2016 19:02:18 -0200
From: Marcelo Tosatti <mtosatti@...hat.com>
To: Andy Lutomirski <luto@...nel.org>
Cc: X86 ML <x86@...nel.org>, Radim Krcmar <rkrcmar@...hat.com>,
Paolo Bonzini <pbonzini@...hat.com>,
linux-kernel@...r.kernel.org, kvm@...r.kernel.org,
Alexander Graf <agraf@...e.de>
Subject: Re: [PATCH] x86/vdso/pvclock: Protect STABLE check with the seqcount
On Mon, Jan 04, 2016 at 03:14:28PM -0800, Andy Lutomirski wrote:
> If the clock becomes unstable while we're reading it, we need to
> bail. We can do this by simply moving the check into the seqcount
> loop.
>
> Reported-by: Marcelo Tosatti <mtosatti@...hat.com>
> Signed-off-by: Andy Lutomirski <luto@...nel.org>
> ---
>
> Marcelo, how's this?
>
> arch/x86/entry/vdso/vclock_gettime.c | 12 ++++++------
> 1 file changed, 6 insertions(+), 6 deletions(-)
>
> diff --git a/arch/x86/entry/vdso/vclock_gettime.c b/arch/x86/entry/vdso/vclock_gettime.c
> index 8602f06c759f..1a50e09c945b 100644
> --- a/arch/x86/entry/vdso/vclock_gettime.c
> +++ b/arch/x86/entry/vdso/vclock_gettime.c
> @@ -126,23 +126,23 @@ static notrace cycle_t vread_pvclock(int *mode)
> *
> * On Xen, we don't appear to have that guarantee, but Xen still
> * supplies a valid seqlock using the version field.
> -
> + *
> * We only do pvclock vdso timing at all if
> * PVCLOCK_TSC_STABLE_BIT is set, and we interpret that bit to
> * mean that all vCPUs have matching pvti and that the TSC is
> * synced, so we can just look at vCPU 0's pvti.
> */
>
> - if (unlikely(!(pvti->flags & PVCLOCK_TSC_STABLE_BIT))) {
> - *mode = VCLOCK_NONE;
> - return 0;
> - }
> -
> do {
> version = pvti->version;
>
> smp_rmb();
>
> + if (unlikely(!(pvti->flags & PVCLOCK_TSC_STABLE_BIT))) {
> + *mode = VCLOCK_NONE;
> + return 0;
> + }
> +
> tsc = rdtsc_ordered();
> pvti_tsc_to_system_mul = pvti->tsc_to_system_mul;
> pvti_tsc_shift = pvti->tsc_shift;
> --
> 2.4.3
Check it before returning the value (once cleared, it can't be set back
to 1), similarly to what was in place before.
Powered by blists - more mailing lists