lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <804857E1F29AAC47BF68C404FC60A1844DA017E3@ORSMSX103.amr.corp.intel.com>
Date:	Fri, 12 Apr 2013 22:07:22 +0000
From:	"Allan, Bruce W" <bruce.w.allan@...el.com>
To:	Dave Jones <davej@...hat.com>,
	"netdev@...r.kernel.org" <netdev@...r.kernel.org>
Subject: RE: e1000e DMA map error [3.8.6]

> -----Original Message-----
> From: netdev-owner@...r.kernel.org [mailto:netdev-
> owner@...r.kernel.org] On Behalf Of Dave Jones
> Sent: Friday, April 12, 2013 1:33 PM
> To: netdev@...r.kernel.org
> Subject: e1000e DMA map error [3.8.6]
> 
> WARNING: at lib/dma-debug.c:933 check_unmap+0x407/0x8a0()
> e1000e 0000:05:00.0: DMA-API: device driver failed to check map
> error[device address=0x000000002dcb8530] [size=24 bytes] [mapped as
> page]
> Modules linked in: ebtable_nat ebtables ipt_MASQUERADE iptable_nat
> nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_CHECKSUM
> iptable_mangle tun bridge stp llc ip6t_REJECT nf_conntrack_ipv6
> nf_defrag_ipv6 xt_conntrack nf_conntrack ip6table_filter ip6_tables
> coretemp kvm_intel snd_emu10k1 kvm snd_util_mem snd_hwdep
> snd_rawmidi snd_ac97_codec iTCO_wdt ac97_bus iTCO_vendor_support
> snd_seq snd_seq_device snd_pcm microcode snd_page_alloc snd_timer
> snd i82975x_edac lpc_ich soundcore emu10k1_gp gameport i2c_i801 e1000e
> mfd_core edac_core binfmt_misc nfsd auth_rpcgss nfs_acl lockd sunrpc
> btrfs zlib_deflate libcrc32c firewire_ohci firewire_core sata_sil crc_itu_t
> radeon i2c_algo_bit drm_kms_helper ttm drm i2c_core
> Pid: 0, comm: swapper/0 Not tainted 3.8.6-203.fc18.x86_64.debug #1
> Call Trace:
>  <IRQ>  [<ffffffff81069a5f>] warn_slowpath_common+0x7f/0xc0
>  [<ffffffff81069b56>] warn_slowpath_fmt+0x46/0x50
>  [<ffffffff81380f67>] check_unmap+0x407/0x8a0
>  [<ffffffff8138161e>] debug_dma_unmap_page+0x5e/0x70
>  [<ffffffffa0382971>] e1000_put_txbuf.isra.34+0x91/0x130 [e1000e]
>  [<ffffffffa0382aeb>] e1000_clean_tx_irq+0xdb/0x320 [e1000e]
>  [<ffffffffa0387b31>] e1000e_poll+0x61/0x430 [e1000e]
>  [<ffffffff81419145>] ? dma_issue_pending_all+0x5/0x200
>  [<ffffffff815dad32>] net_rx_action+0x172/0x380
>  [<ffffffff81073720>] __do_softirq+0xf0/0x3d0
>  [<ffffffff817272fc>] call_softirq+0x1c/0x30
>  [<ffffffff8101c445>] do_softirq+0xa5/0xe0
>  [<ffffffff81073bf5>] irq_exit+0xd5/0xe0
>  [<ffffffff81727bb3>] do_IRQ+0x63/0xe0
>  [<ffffffff8171ce32>] common_interrupt+0x72/0x72
>  <EOI>  [<ffffffff810d4b7c>] ? tick_nohz_idle_exit+0x14c/0x1c0
>  [<ffffffff810d4b80>] ? tick_nohz_idle_exit+0x150/0x1c0
>  [<ffffffff810d4b7c>] ? tick_nohz_idle_exit+0x14c/0x1c0
>  [<ffffffff81024525>] cpu_idle+0x125/0x140
>  [<ffffffff816fcc59>] rest_init+0x149/0x150
>  [<ffffffff816fcb15>] ? rest_init+0x5/0x150
>  [<ffffffff81ee3c77>] start_kernel+0x408/0x415
>  [<ffffffff81ee366e>] ? repair_env_string+0x5e/0x5e
>  [<ffffffff81ee3356>] x86_64_start_reservations+0x131/0x135
>  [<ffffffff81ee345a>] x86_64_start_kernel+0x100/0x10f
> ---[ end trace e302d171bf270f8f ]---
> Mapped at:
>  [<ffffffff813816d9>] debug_dma_map_page+0xa9/0x150
>  [<ffffffffa0384dac>] e1000_xmit_frame+0x69c/0xeb0 [e1000e]
>  [<ffffffff815db9e0>] dev_hard_start_xmit+0x250/0x6e0
>  [<ffffffff815fd8fe>] sch_direct_xmit+0xfe/0x2a0
>  [<ffffffff815dc5d0>] dev_queue_xmit+0x1f0/0x920

Thank-you for the report; I believe this has already been fixed in DaveM's and
Linus' trees but not yet in -stable.

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ