summaryrefslogtreecommitdiffstats
path: root/drivers/atm/he.c
diff options
context:
space:
mode:
authorJulian Wiedmann <jwi@linux.ibm.com>2018-06-29 19:45:53 +0200
committerDavid S. Miller <davem@davemloft.net>2018-06-30 21:19:48 +0900
commitce28867fd20c23cd769e78b4d619c4755bf71a1c (patch)
treed0adb3b90977c45f998bcd940996cc1462a1906b /drivers/atm/he.c
parent9d0a58fb9747afd27d490c02a97889a1b59f6be4 (diff)
downloadtalos-obmc-linux-ce28867fd20c23cd769e78b4d619c4755bf71a1c.tar.gz
talos-obmc-linux-ce28867fd20c23cd769e78b4d619c4755bf71a1c.zip
s390/qeth: don't clobber buffer on async TX completion
If qeth_qdio_output_handler() detects that a transmit requires async completion, it replaces the pending buffer's metadata object (qeth_qdio_out_buffer) so that this queue buffer can be re-used while the data is pending completion. Later when the CQ indicates async completion of such a metadata object, qeth_qdio_cq_handler() tries to free any data associated with this object (since HW has now completed the transfer). By calling qeth_clear_output_buffer(), it erronously operates on the queue buffer that _previously_ belonged to this transfer ... but which has been potentially re-used several times by now. This results in double-free's of the buffer's data, and failing transmits as the buffer descriptor is scrubbed in mid-air. The correct way of handling this situation is to 1. scrub the queue buffer when it is prepared for re-use, and 2. later obtain the data addresses from the async-completion notifier (ie. the AOB), instead of the queue buffer. All this only affects qeth devices used for af_iucv HiperTransport. Fixes: 0da9581ddb0f ("qeth: exploit asynchronous delivery of storage blocks") Signed-off-by: Julian Wiedmann <jwi@linux.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/atm/he.c')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud