lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHsu+b8JkVPbh7p7pj4u2XFJ3oA+HfxiGVJyz7TLG3FNQzBZCQ@mail.gmail.com>
Date:	Sat, 2 Mar 2013 18:28:57 +0100
From:	Andre Heider <a.heider@...il.com>
To:	netdev@...r.kernel.org, xiong@....qualcomm.com
Subject: atl1c: DMA: Out of SW-IOMMU space

Hi,

my "AR8151 v2.0 Gigabit Ethernet (rev c0)" becomes unusable on v3.8
after some usage.

It's easily reproducible with "dd if=/dev/zero of=<nfsshare>/test
bs=1M count=2048. Point of failure varies, but somewhat after >1.5gb
of data written to the nfs server dmesg gets spammed with "DMA: Out of
SW-IOMMU space for x bytes at device 0000:06:00.0" (where x varies)
and all sorts of follow up problems start occurring.
Apparently I'm not the only one affected:
https://www.google.com/search?q=atl1c+%22DMA%3A+Out+of+SW-IOMMU+space%22

The problem doesn't exist on v3.8-rc7.

The only atl1c commit in v3.8-rc7..v3.8 is:

commit ac574804d412047e52de4dd887615cc88f58aeb0
Author: Huang, Xiong <xiong@....qualcomm.com>
Date:   Mon Feb 11 14:44:40 2013 +0000

    atl1c: add error checking for pci_map_single functions

    it is reported that code hit DMA-API errors on 3.8-rc6+,
    (see https://bugzilla.redhat.com/show_bug.cgi?id=908436, and
         https://bugzilla.redhat.com/show_bug.cgi?id=908550)

    this patch just adds error handler for
        pci_map_single and skb_frag_dma_map.

    Signed-off-by: xiong <xiong@....qualcomm.com>
    Signed-off-by: David S. Miller <davem@...emloft.net>

Reverting that on top of v3.8 seems to fix the problem in my little
testing, so it sounds like that fix introduced a iommu leak?

Thanks,
Andre
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ