aboutsummaryrefslogtreecommitdiff
path: root/sys/kern/subr_disklabel.c
diff options
context:
space:
mode:
authorDavid Greenman <dg@FreeBSD.org>1995-08-07 11:55:32 +0000
committerDavid Greenman <dg@FreeBSD.org>1995-08-07 11:55:32 +0000
commit5d210d3fd4d4a87ac2065f8a6fc94b653be05762 (patch)
treeb20deb3e639a58389e2df80d3410e75a01ab0622 /sys/kern/subr_disklabel.c
parentb4224c9c6c7d89022dc90474ea6b5d89ea268103 (diff)
downloadsrc-5d210d3fd4d4a87ac2065f8a6fc94b653be05762.tar.gz
src-5d210d3fd4d4a87ac2065f8a6fc94b653be05762.zip
Since buffers can be pulled off of the disk queue at interrupt time and
disksort is called at non-interrupt time and can be actively traversing the list when that happens, there is a very small window of vulnerability. Close it by protecting disksort with splbio().
Notes
Notes: svn path=/head/; revision=9982
Diffstat (limited to 'sys/kern/subr_disklabel.c')
-rw-r--r--sys/kern/subr_disklabel.c9
1 files changed, 7 insertions, 2 deletions
diff --git a/sys/kern/subr_disklabel.c b/sys/kern/subr_disklabel.c
index 958f5946e88b..c1d1f569d2cc 100644
--- a/sys/kern/subr_disklabel.c
+++ b/sys/kern/subr_disklabel.c
@@ -42,7 +42,7 @@
* SUCH DAMAGE.
*
* @(#)ufs_disksubr.c 8.5 (Berkeley) 1/21/94
- * $Id: ufs_disksubr.c,v 1.14 1995/03/18 07:06:51 davidg Exp $
+ * $Id: ufs_disksubr.c,v 1.15 1995/05/30 08:15:33 rgrimes Exp $
*/
#include <sys/param.h>
@@ -80,11 +80,14 @@ disksort(ap, bp)
register struct buf *ap, *bp;
{
register struct buf *bq;
+ int s;
+ s = splbio();
/* If the queue is empty, then it's easy. */
if (ap->b_actf == NULL) {
bp->b_actf = NULL;
ap->b_actf = bp;
+ splx(s);
return;
}
@@ -142,8 +145,10 @@ disksort(ap, bp)
* Neither a second list nor a larger request... we go at the end of
* the first list, which is the same as the end of the whole schebang.
*/
-insert: bp->b_actf = bq->b_actf;
+insert:
+ bp->b_actf = bq->b_actf;
bq->b_actf = bp;
+ splx(s);
}
/*