Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp798326ybb; Thu, 28 Mar 2019 12:23:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqxYthAkEWut14sHU3rvr2Jc49bMCxajNYMmdQppE4kf5HMg0QdVHhWJQTG3Gul6WsjM3RSb X-Received: by 2002:a62:6c6:: with SMTP id 189mr42201514pfg.36.1553800991753; Thu, 28 Mar 2019 12:23:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553800991; cv=none; d=google.com; s=arc-20160816; b=rAKYGUsZLHLkTV2zONyuNOrDd9lgAb55DusCjIr4gvlllqSz2D2a0yBFYCW/0ojzj/ MwWBWjDPuzv6I8u6oQ+zcHOZA82YhzJra91aTQkcWfmldbj6nZNT3EvCTTIslB6djKA/ RloKlRknOLBVbtUCVfcRyQ67HezaVnZcj3gYAbNSjStipv2sPhd1SxcQgo0q+m6YXOQv UGR65Wa3W3c7TtfiGCFJZZBisrdW/V0i1HFFq9Fou2zQ8aQUYvU9XY1apuGr8rwROS4J h0VzTZ7bVFWhw4nG9aiwZ2pJaLtgmHcwBI3PGF6NWIOE7539QEyo+a5OC3KvcsDcsuGS 0C7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=SVq1zIX6HZt7aQJaPH/6gKTAeUZeJ7EtF9d2GA+QAuc=; b=o+Lqb5syZUgorgMIQxCzmjoB3wx/cUTbj6Q7aCGgSDZZsejQTyk1FSfgxsCDetlAsc aGfK+0zFOWkKiEls09vB8xiUCkeyvJQlP93xXSgE05rZ74ZpfFUASpECkhcF7e0MOt/d WC1dJzDIIbIHWDYoLYRbfhIGvpAmvJKjEAjR0gbF2dIPJ81+XGSGBT6RpCNVwK4fVkfE sygp4VT4DU4K2UtFt7CrC4mU9La2cYMGy5NMc2UUTLHreJtcwfhDCUTlMeijGD3oj+8R IDuoLNHvICbY+LUKrWWYTepNZvJ36YMe8SPCReaCCz55Zho7zHPEYuxz2NbiXDqBvIkp 2Ilw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q12si23841159pli.428.2019.03.28.12.22.56; Thu, 28 Mar 2019 12:23:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726318AbfC1TWP (ORCPT + 99 others); Thu, 28 Mar 2019 15:22:15 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:52754 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726045AbfC1TWP (ORCPT ); Thu, 28 Mar 2019 15:22:15 -0400 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 8A8AC106FCB98; Thu, 28 Mar 2019 12:22:14 -0700 (PDT) Date: Thu, 28 Mar 2019 12:22:14 -0700 (PDT) Message-Id: <20190328.122214.1269115693598269959.davem@davemloft.net> To: haiyangz@linuxonhyperv.com Cc: sashal@kernel.org, linux-hyperv@vger.kernel.org, haiyangz@microsoft.com, kys@microsoft.com, sthemmin@microsoft.com, olaf@aepfle.de, vkuznets@redhat.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH hyperv-fixes,v2] hv_netvsc: Fix unwanted wakeup after tx_disable From: David Miller In-Reply-To: <20190328191637.6698-1-haiyangz@linuxonhyperv.com> References: <20190328191637.6698-1-haiyangz@linuxonhyperv.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Thu, 28 Mar 2019 12:22:14 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Haiyang Zhang Date: Thu, 28 Mar 2019 19:16:37 +0000 > From: Haiyang Zhang > > After queue stopped, the wakeup mechanism may wake it up again > when ring buffer usage is lower than a threshold. This may cause > send path panic on NULL pointer when we stopped all tx queues in > netvsc_detach and start removing the netvsc device. > > This patch fix it by adding a tx_disable flag to prevent unwanted > queue wakeup. > > Fixes: 7b2ee50c0cd5 ("hv_netvsc: common detach logic") > Reported-by: Mohammed Gamal > Signed-off-by: Haiyang Zhang Still need to fix the inline issues I mentioned in v1.