lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 19 Apr 2013 16:36:01 +0200
From:	Lucas Stach <l.stach@...gutronix.de>
To:	netdev@...r.kernel.org
Cc:	David Miller <davem@...emloft.net>,
	Frank Li <Frank.Li@...escale.com>,
	Shawn Guo <shawn.guo@...aro.org>,
	Fabio Estevam <festevam@...il.com>,
	Lucas Stach <l.stach@...gutronix.de>
Subject: [PATCH 0/3] URGENT for 3.9: net: fec: revert NAPI introduction 

Those patches introduce instability to the point of kernel OOPSes with
NULL-ptr dereferences.

The patches drop locks from the code without justifying why this would
be safe at all. In fact it isn't safe as now the controller restart can
happily free the RX and TX ring buffers while the NAPI poll function is
still accessing them. So with a heavily loaded but slightly instable
link we regularly end up with OOPSes because link change restarts
the FEC and bombs away buffers still in use.

Also the NAPI enabled interrupt handler ACKs the INT and only later
masks it, this way introducing a window where new interrupts could sneak
in while we are already in polling mode.

As it's way too late in the cycle to try and fix this up just revert the
relevant patches for now.

Lucas Stach (3):
  Revert "net: fec: fix missing napi_disable call"
  Revert "net: fec: put tx to napi poll function to fix dead lock"
  Revert "net: fec: add napi support to improve proformance"

 drivers/net/ethernet/freescale/fec.c | 126 ++++++++++++++---------------------
 drivers/net/ethernet/freescale/fec.h |   5 +-
 2 files changed, 53 insertions(+), 78 deletions(-)

-- 
1.8.2.rc2

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ