summaryrefslogtreecommitdiffstats
path: root/drivers/hv/ring_buffer.c
diff options
context:
space:
mode:
authorDexuan Cui2016-06-10 03:47:24 +0200
committerGreg Kroah-Hartman2016-08-31 13:05:41 +0200
commit638fea33aee858cc665297a76f0039e95a28ce0c (patch)
treeb7d64f0d5feea234364b488021b729c1ef3434c0 /drivers/hv/ring_buffer.c
parentDrivers: hv: utils: fix a race on userspace daemons registration (diff)
downloadkernel-qcow2-linux-638fea33aee858cc665297a76f0039e95a28ce0c.tar.gz
kernel-qcow2-linux-638fea33aee858cc665297a76f0039e95a28ce0c.tar.xz
kernel-qcow2-linux-638fea33aee858cc665297a76f0039e95a28ce0c.zip
Drivers: hv: vmbus: fix the race when querying & updating the percpu list
There is a rare race when we remove an entry from the global list hv_context.percpu_list[cpu] in hv_process_channel_removal() -> percpu_channel_deq() -> list_del(): at this time, if vmbus_on_event() -> process_chn_event() -> pcpu_relid2channel() is trying to query the list, we can get the kernel fault. Similarly, we also have the issue in the code path: vmbus_process_offer() -> percpu_channel_enq(). We can resolve the issue by disabling the tasklet when updating the list. The patch also moves vmbus_release_relid() to a later place where the channel has been removed from the per-cpu and the global lists. Reported-by: Rolf Neugebauer <rolf.neugebauer@docker.com> Signed-off-by: Dexuan Cui <decui@microsoft.com> Signed-off-by: K. Y. Srinivasan <kys@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'drivers/hv/ring_buffer.c')
0 files changed, 0 insertions, 0 deletions