lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 24 Jan 2015 21:54:06 -0800 (PST) From: David Miller <davem@...emloft.net> To: b38611@...escale.com Cc: netdev@...r.kernel.org, festevam@...il.com, christian.gmeiner@...il.com, moon.linux@...oo.com, bhutchings@...arflare.com, stephen@...workplumber.org Subject: Re: [PATCH net-next 1/1] net: fec: fix the warning found by dma debug From: Fugang Duan <b38611@...escale.com> Date: Tue, 20 Jan 2015 14:10:35 +0800 > Enable kernel config "CONFIG_HAVE_DMA_API_DEBUG", FEC have kernel warning: ... > There have one bug in .fec_enet_tx_queue() function to unmap the DMA memory: > For SG or TSO, get one buffer descriptor and then unmap the related DMA memory, and then > get the next buffer descriptor, loop to while() to check "TX_READY". If "TX_READY" bit > still __IS__ existed in the BD (The next fraglist or next TSO packet is not transmited > complitely), exit the current clean work. When the next work is triggered, it still repeat > above step with the same BD. The potential issue is that unmap the same DMA memory for > multiple times. > > The patch fix the clean work for SG and TSO packet. > > Reported-by: Anand Moon <moon.linux@...oo.com> > Reported-by: Christian Gmeiner <christian.gmeiner@...il.com> > Signed-off-by: Fugang Duan <B38611@...escale.com> Applied. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists