lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 05 Jul 2011 07:10:42 +0200 From: Eric Dumazet <eric.dumazet@...il.com> To: Alexey Zaytsev <alexey.zaytsev@...il.com> Cc: Michael Büsch <m@...s.ch>, Andrew Morton <akpm@...ux-foundation.org>, netdev@...r.kernel.org, Gary Zambrano <zambrano@...adcom.com>, bugme-daemon@...zilla.kernel.org, "David S. Miller" <davem@...emloft.net>, Pekka Pietikainen <pp@...oulu.fi>, Florian Schirmer <jolt@...box.org>, Felix Fietkau <nbd@...nwrt.org>, Michael Buesch <mb@...sch.de> Subject: Re: [Bugme-new] [Bug 38102] New: BUG kmalloc-2048: Poison overwritten Le mardi 05 juillet 2011 à 08:57 +0400, Alexey Zaytsev a écrit : > Ran tcpdump. You are right, I was wrong. Sorry for the noise. Thanks for testing ;) It would be nice to know if the memory scribbles start after or before one RFO triggers. I can see this calls b44_init_rings() without really stopping the device before. This seems very suspect to me. diff --git a/drivers/net/b44.c b/drivers/net/b44.c index a69331e..b22dd4c 100644 --- a/drivers/net/b44.c +++ b/drivers/net/b44.c @@ -829,6 +829,7 @@ static int b44_rx(struct b44 *bp, int budget) } bp->rx_cons = cons; + wmb(); bw32(bp, B44_DMARX_PTR, cons * sizeof(struct dma_desc)); return received; @@ -848,6 +849,7 @@ static int b44_poll(struct napi_struct *napi, int budget) /* spin_unlock(&bp->tx_lock); */ } if (bp->istat & ISTAT_RFO) { /* fast recovery, in ~20msec */ + pr_err("b44: ISTAT_RFO !\n"); bp->istat &= ~ISTAT_RFO; b44_disable_ints(bp); ssb_device_enable(bp->sdev, 0); /* resets ISTAT_RFO */ -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists