[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20130122.141519.767456896436365582.davem@davemloft.net>
Date: Tue, 22 Jan 2013 14:15:19 -0500 (EST)
From: David Miller <davem@...emloft.net>
To: eric.dumazet@...il.com
Cc: christoph.paasch@...ouvain.be, Ian.Campbell@...rix.com,
sony.chacko@...gic.com, rajesh.borundia@...gic.com,
netdev@...r.kernel.org
Subject: Re: BUG in netxen_release_tx_buffers when TSO enabled on kernels
>= 3.3 and <= 3.6
From: Eric Dumazet <eric.dumazet@...il.com>
Date: Tue, 22 Jan 2013 08:33:05 -0800
> From: Eric Dumazet <edumazet@...gle.com>
...
> [PATCH] netxen: fix off by one bug in netxen_release_tx_buffer()
>
> Christoph Paasch found netxen could trigger a BUG in its dismantle
> phase, in netxen_release_tx_buffer(), using full size TSO packets.
>
> cmd_buf->frag_count includes the skb->data part, so the loop must
> start at index 1 instead of 0, or else we can make an out
> of bound access to cmd_buff->frag_array[MAX_SKB_FRAGS + 2]
>
> Christoph provided the fixes in netxen_map_tx_skb() function.
> In case of a dma mapping error, its better to clear the dma fields
> so that we don't try to unmap them again in netxen_release_tx_buffer()
>
> Reported-by: Christoph Paasch <christoph.paasch@...ouvain.be>
> Signed-off-by: Eric Dumazet <edumazet@...gle.com>
> Tested-by: Christoph Paasch <christoph.paasch@...ouvain.be>
Applied and queued up for -stable, thanks.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists