lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 24 Feb 2015 23:25:32 -0500 (EST)
From:	David Miller <davem@...emloft.net>
To:	thomas.lendacky@....com
Cc:	netdev@...r.kernel.org
Subject: Re: [PATCH net] amd-xgbe: Do not schedule napi until ready

From: Tom Lendacky <thomas.lendacky@....com>
Date: Tue, 24 Feb 2015 10:48:01 -0600

> It is possible that the ethernet device could not have been properly
> shutdown when Linux begins executing, through firmware use for example.
> Until the amd-xgbe module is loaded, interrupts associated with the
> the device could be pending. Once the module is loaded and interrupts
> are requested, the interrupt could fire right away. If napi support
> has not been initialized then the poll function will be null and result
> in a kernel panic when napi attempts to invoke the poll function. Add
> a check to the interrupt routine to be sure napi has been initialized
> before trying to schedule it.
> 
> Also, move the napi enablement support to be a bit earlier during
> startup and a bit later during shutdown to be certain napi support is
> enabled while the device can perform DMA.
> 
> Signed-off-by: Tom Lendacky <thomas.lendacky@....com>

This is not how you fix a problem like this.

You should absolutely not request the IRQ for the device, nor should
you enable NAPI, until the device and driver are both fully setup and
able to process those events successfully.

Trust me, you're not the first person to hit this kind of problem.
:-)
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ