Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp527591yba; Mon, 1 Apr 2019 11:06:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqyMAG2w5ajc+31pETVVMVbJtEPi8ok7RJFS1eHnk1LPn2gf+7+vxMzhe5zCON3pOhZdpIDs X-Received: by 2002:a17:902:123:: with SMTP id 32mr65075235plb.187.1554141989452; Mon, 01 Apr 2019 11:06:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554141989; cv=none; d=google.com; s=arc-20160816; b=DR5Ckb+mlXgz2yph1EVPNb02CTBSPaDNKlwFLXzKh3ZQGWDa04EvcbBsuSkbvJ0t62 4nw0HO72j4iIqLRfSHD5nRKirNOAabYhhZrZRs/lKqON9PmFdmMoslNKRNIv8F8jv9ze rPRE1MFrj1SY9OmcmF/8wI66fFc4ya5R7c3F/qDMf6Cku1bwgOv/jTHI+8oJZPtMdMoy IDkA2OOSlzrTZeEORlX30Tz9kvBSF0oUWOlcjoPeD0sw+nl0VFn2CDbhn87xXISDBssn 3qh2Nna7Mv1hUHhIdfk7q7FC8kKOe49cny6AOq6AsjmK0hVl3g+IqUFbDfJzMJglhnRD iuRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=Z9u1NAPBuvPQbiLvLHIR0AlLMTtL3ULcUig91ycoovQ=; b=i3rrrVifnk8pE7OC0+R9GBQx2Wd+xbJQahWG82w+EyU7GFUkA0UcDYcezzNUJKWc8j /CMWHYq25aErFVcAfeXu7umY7exPpVOfSyMeLZOeR+5vl9wXm5KF/SOtVtWuhVa8uHP+ l13EwkBrbh20xHSofaOF+fIQXBPnFM6y3Dag+M+OOIoVjsxyM7RUy0L5C548NGCHBDp2 SbukOWCnPT5ba15EEilsf43dvZ4r3s7U2YR1TD5UCOfngdEQerhXq8I3TfTfDUNUTLwF ozwkHSjFY5ZC5nTmeF7AddUXV+EdTrE077ppfOG1hngM9OQxFVQ7AdyE8DEG5+icG77F mWWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bc12si9021833plb.13.2019.04.01.11.06.13; Mon, 01 Apr 2019 11:06:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730731AbfDASFj (ORCPT + 99 others); Mon, 1 Apr 2019 14:05:39 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:32948 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730440AbfDARNE (ORCPT ); Mon, 1 Apr 2019 13:13:04 -0400 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 05E1B14B8AF55; Mon, 1 Apr 2019 10:13:03 -0700 (PDT) Date: Fri, 29 Mar 2019 13:34:43 -0700 (PDT) Message-Id: <20190329.133443.2076313992847138247.davem@davemloft.net> To: haiyangz@linuxonhyperv.com Cc: sashal@kernel.org, linux-hyperv@vger.kernel.org, haiyangz@microsoft.com, kys@microsoft.com, sthemmin@microsoft.com, olaf@aepfle.de, vkuznets@redhat.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH hyperv-fixes,v3] hv_netvsc: Fix unwanted wakeup after tx_disable From: David Miller In-Reply-To: <20190328194036.7279-1-haiyangz@linuxonhyperv.com> References: <20190328194036.7279-1-haiyangz@linuxonhyperv.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Mon, 01 Apr 2019 10:13:04 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Haiyang Zhang Date: Thu, 28 Mar 2019 19:40:36 +0000 > From: Haiyang Zhang > > After queue stopped, the wakeup mechanism may wake it up again > when ring buffer usage is lower than a threshold. This may cause > send path panic on NULL pointer when we stopped all tx queues in > netvsc_detach and start removing the netvsc device. > > This patch fix it by adding a tx_disable flag to prevent unwanted > queue wakeup. > > Fixes: 7b2ee50c0cd5 ("hv_netvsc: common detach logic") > Reported-by: Mohammed Gamal > Signed-off-by: Haiyang Zhang Applied and queued up for -stable, thanks.