lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 7 Apr 2011 12:49:03 +0200
From:	Sedat Dilek <sedat.dilek@...glemail.com>
To:	netdev@...r.kernel.org, LKML <linux-kernel@...r.kernel.org>,
	linux-next <linux-next@...r.kernel.org>,
	Tom Herbert <therbert@...gle.com>
Cc:	Jay Vosburgh <fubar@...ibm.com>,
	Andy Gospodarek <andy@...yhouse.net>,
	"David S. Miller" <davem@...emloft.net>,
	Alexey Kuznetsov <kuznet@....inr.ac.ru>,
	"Pekka Savola (ipv6)" <pekkas@...core.fi>,
	James Morris <jmorris@...ei.org>,
	Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>,
	Patrick McHardy <kaber@...sh.net>,
	Eric Dumazet <eric.dumazet@...il.com>,
	Changli Gao <xiaosuo@...il.com>,
	Jesse Gross <jesse@...ira.com>,
	Michał Mirosław <mirq-linux@...e.qmqm.pl>,
	Ben Hutchings <bhutchings@...arflare.com>,
	Stanislaw Gruszka <sgruszka@...hat.com>,
	Kees Cook <kees.cook@...onical.com>,
	Stephen Rothwell <sfr@...b.auug.org.au>
Subject: [net-next-2.6] Revert "net: Allow no-cache copy from user on transmit"

[ The long CC list I got via ./scripts/get_maintainer.pl ]

Hi,

with yesterday's linux-next (next-20110406) I discovered first time
network problems.
Today's next-20110407 shows the same symptoms.
In my IRC client the connection via SSL-encryption to freenode and
oftc are not established.
Also, I saw "stalls" on websites in firefox.

Luckily, next-20110405 was OK, so I started to look at the
net-next-2.6 merge and its commits.
( Furthermore, I tested a 2.6.39-rc2 vanilla kernel to ensure the
problem comes from linux-next patch. )

By reverting all 10 commits my system worked as expected, here the list:

0001-Revert-net-Allow-no-cache-copy-from-user-on-transmit.patch
0002-Revert-bridge-range-check-STP-parameters.patch
0003-Revert-bridge-allow-creating-bridge-devices-with-net.patch
0004-Revert-bridge-allow-creating-deleting-fdb-entries-vi.patch
0005-Revert-bridge-add-netlink-notification-on-forward-en.patch
0006-Revert-bridge-split-rcu-and-no-rcu-cases-of-fdb-look.patch
0007-Revert-bridge-track-last-used-time-in-forwarding-tab.patch
0008-Revert-bridge-change-arguments-to-fdb_create.patch
0009-Revert-pkt_sched-QFQ-quick-fair-queue-scheduler.patch
0010-Revert-xen-netfront-assume-all-hw-features-are-avail.patch

In a next run, I started with only
"0001-Revert-net-Allow-no-cache-copy-from-user-on-transmit.patch".
It turned out that this is the culprit commit.
( I have not played with the new ethtool option tx-nocache-copy in
"BROKEN" kernel. )

My wificard is an Atheros ath5k.
I attached my kernel-config and the revert-patch which makes the
system stable again.

Can you have a look at it?

I you want me to help with debugging, please give me precise instructions.

Regards,
- Sedat -

Download attachment "config-2.6.39-rc2-next20110407.6-686-small" of type "application/octet-stream" (87899 bytes)

View attachment "0001-Revert-net-Allow-no-cache-copy-from-user-on-transmit.patch" of type "text/x-patch" (6343 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ