lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <9929d2390911140001t2938271ep7455de5874ee0144@mail.gmail.com> Date: Sat, 14 Nov 2009 00:01:32 -0800 From: Jeff Kirsher <jeffrey.t.kirsher@...el.com> To: Simon Horman <horms@...ge.net.au> Cc: e1000-devel@...ts.sourceforge.net, netdev@...r.kernel.org, Alexander Duyck <alexander.h.duyck@...el.com>, Arnd Bergmann <arndbergmann@...glemail.com> Subject: Re: [rfc 0/4] igb: bandwidth allocation On Wed, Nov 4, 2009 at 18:21, Simon Horman <horms@...ge.net.au> wrote: > On Wed, Nov 04, 2009 at 05:46:50PM -0800, Jeff Kirsher wrote: >> On Wed, Nov 4, 2009 at 16:58, Simon Horman <horms@...ge.net.au> wrote: >> > Hi, >> > >> > this series of patches exposes the bandwidth allocation >> > hardware support of the Intel 82576. It does so through >> > a rather hackish sysfs entry. That interface is just intended >> > for testing so that the exposed hardware feature can >> > be exercised. I would like to find a generic way to expose >> > this feature to user-space. >> > >> >> Thanks Simon. I have add the 4 patch series to my tree for testing. > > Thanks. I wanted to get the code out rather than sitting on it > for lack of a better user-space interface. Although there > is a lot of fluff the actual register twiddling for > bandwidth allocation turned out to be quite simple. > Simon - After doing some testing on the series of patches, we are getting a panic with these patches applied to net-next. I have provided below the panic we saw, right now we have a large patch load so a bisect will have to wait. Hopefully with time permitting, we will be able to revisit these patches soon. igbvf 0000:02:10.0: PF still resetting igbvf 0000:02:10.2: PF still resetting igbvf 0000:02:10.4: PF still resetting igbvf 0000:02:10.6: PF still resetting igbvf 0000:02:11.0: PF still resetting igbvf 0000:02:11.2: PF still resetting igbvf 0000:02:11.4: PF still resetting igbvf 0000:02:10.1: PF still resetting igbvf 0000:02:10.3: PF still resetting igbvf 0000:02:10.5: PF still resetting igbvf 0000:02:10.7: PF still resetting igbvf 0000:02:11.1: PF still resetting igbvf 0000:02:11.3: PF still resetting igbvf 0000:02:11.5: PF still resetting BUG: unable to handle kernel NULL pointer dereference at 0000000000000008 IP: [<ffffffffa0087d3c>] igb_xmit_frame_ring_adv+0x1d/0x71a [igb] PGD 0 Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC last sysfs file: /sys/bus/pci/slots/1-1/address CPU 1 Modules linked in: igbvf igb ipv6 autofs4 sunrpc cpufreq_ondemand acpi_cpufreq freq_table video output sbs sbshc joydev e1000e e1000 i2c_i801 shpchp i2c_core pcspkr iTCO_wdt iTCO_vendor_support usb_storage [last unloaded: igb] Pid: 52, comm: events/1 Not tainted 2.6.32-rc3-net-next-vf-tag111109 #1 S5520HC RIP: 0010:[<ffffffffa0087d3c>] [<ffffffffa0087d3c>] igb_xmit_frame_ring_adv+0x1d/0x71a [igb] RSP: 0018:ffff8801f8803aa0 EFLAGS: 00010286 RAX: 0000000000000001 RBX: 0000000000000600 RCX: 0000000000000000 RDX: ffff8803609e4700 RSI: 0000000000000000 RDI: ffff88036559d500 RBP: ffff8801f8803b10 R08: 0000000000000000 R09: ffff8801f8994018 R10: ffff88036559d500 R11: ffffffff81e9caf8 R12: ffff88036559d500 R13: ffff88036559d500 R14: 0000000000000000 R15: ffff88036791a4c0 FS: 0000000000000000(0000) GS:ffff8801f8800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b CR2: 0000000000000008 CR3: 0000000001001000 CR4: 00000000000006e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process events/1 (pid: 52, threadinfo ffff8801e91a6000, task ffff8801e91abfc0) Stack: ffff8801e91abfc0 0000000000000000 0000000000000001 0000000000000000 <0> ffff8801f8803b20 0000000000000246 0000000000000000 ffffffff812f7558 <0> ffff880100000000 ffff8803609f4e00 ffff88036559d500 ffff8803609e4000 Call Trace: <IRQ> [<ffffffff812f7558>] ? __netif_tx_lock+0x16/0x1f [<ffffffffa008c130>] igb_xmit_frame_adv+0x3a/0x3c [igb] [<ffffffff812e55d7>] dev_hard_start_xmit+0x1d1/0x27e [<ffffffff812f7cc2>] sch_direct_xmit+0x68/0x14e [<ffffffff812e59bd>] dev_queue_xmit+0x22e/0x378 [<ffffffff812e588d>] ? dev_queue_xmit+0xfe/0x378 [<ffffffff8104b565>] ? _local_bh_enable_ip+0x9c/0xa7 [<ffffffff812eb72c>] neigh_resolve_output+0x1f0/0x225 [<ffffffffa013a3be>] ip6_output_finish+0x6f/0xd6 [ipv6] [<ffffffffa013adbb>] ip6_output2+0x328/0x337 [ipv6] [<ffffffffa013bcce>] ip6_output+0xf04/0xf28 [ipv6] [<ffffffffa01547af>] dst_output+0xb/0xd [ipv6] [<ffffffffa0155ea7>] mld_sendpack+0x2aa/0x48f [ipv6] [<ffffffffa0157001>] mld_ifc_timer_expire+0x1c8/0x201 [ipv6] [<ffffffffa0156e39>] ? mld_ifc_timer_expire+0x0/0x201 [ipv6] [<ffffffff81051667>] run_timer_softirq+0x1b0/0x26b [<ffffffff810515da>] ? run_timer_softirq+0x123/0x26b [<ffffffff8106681b>] ? ktime_get+0x73/0x8e [<ffffffff8106a79e>] ? tick_dev_program_event+0x2a/0x9c [<ffffffff8104bcf1>] __do_softirq+0xd5/0x19d [<ffffffff8100cc9c>] call_softirq+0x1c/0x34 [<ffffffff8100e2d8>] do_softirq+0x33/0x6b [<ffffffff8104b959>] irq_exit+0x36/0x8a [<ffffffff81020129>] smp_apic_timer_interrupt+0x78/0x87 [<ffffffff8100c673>] apic_timer_interrupt+0x13/0x20 <EOI> [<ffffffff8130dec4>] ? rt_cache_flush+0x154/0x169 [<ffffffff8133feeb>] ? fib_netdev_event+0x84/0x8b [<ffffffff81382b1c>] ? notifier_call_chain+0x33/0x5b [<ffffffff812f0fd5>] ? linkwatch_event+0x0/0x31 [<ffffffff81062679>] ? __raw_notifier_call_chain+0x9/0xb [<ffffffff8106268a>] ? raw_notifier_call_chain+0xf/0x11 [<ffffffff812e5b9d>] ? call_netdevice_notifiers+0x16/0x18 -- Cheers, Jeff -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists