lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 2 May 2019 09:05:41 +0000 From: Laurentiu Tudor <laurentiu.tudor@....com> To: "jocke@...inera.com" <joakim.tjernlund@...inera.com>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, Madalin-cristian Bucur <madalin.bucur@....com>, Leo Li <leoyang.li@....com>, Roy Pledge <roy.pledge@....com>, Camelia Alexandra Groza <camelia.groza@....com> CC: "linuxppc-dev@...ts.ozlabs.org" <linuxppc-dev@...ts.ozlabs.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "davem@...emloft.net" <davem@...emloft.net>, "linux-arm-kernel@...ts.infradead.org" <linux-arm-kernel@...ts.infradead.org>, "iommu@...ts.linux-foundation.org" <iommu@...ts.linux-foundation.org> Subject: RE: [PATCH v2 9/9] dpaa_eth: fix SG frame cleanup Hi Joakim, > -----Original Message----- > From: Joakim Tjernlund <Joakim.Tjernlund@...inera.com> > Sent: Saturday, April 27, 2019 8:11 PM > > On Sat, 2019-04-27 at 10:10 +0300, laurentiu.tudor@....com wrote: > > From: Laurentiu Tudor <laurentiu.tudor@....com> > > > > Fix issue with the entry indexing in the sg frame cleanup code being > > off-by-1. This problem showed up when doing some basic iperf tests and > > manifested in traffic coming to a halt. > > > > Signed-off-by: Laurentiu Tudor <laurentiu.tudor@....com> > > Acked-by: Madalin Bucur <madalin.bucur@....com> > > Wasn't this a stable candidate too? Yes, it is. I forgot to add the cc:stable tag, sorry about that. --- Best Regards, Laurentiu > > --- > > drivers/net/ethernet/freescale/dpaa/dpaa_eth.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/drivers/net/ethernet/freescale/dpaa/dpaa_eth.c > b/drivers/net/ethernet/freescale/dpaa/dpaa_eth.c > > index daede7272768..40420edc9ce6 100644 > > --- a/drivers/net/ethernet/freescale/dpaa/dpaa_eth.c > > +++ b/drivers/net/ethernet/freescale/dpaa/dpaa_eth.c > > @@ -1663,7 +1663,7 @@ static struct sk_buff *dpaa_cleanup_tx_fd(const > struct dpaa_priv *priv, > > qm_sg_entry_get_len(&sgt[0]), dma_dir); > > > > /* remaining pages were mapped with skb_frag_dma_map() > */ > > - for (i = 1; i < nr_frags; i++) { > > + for (i = 1; i <= nr_frags; i++) { > > WARN_ON(qm_sg_entry_is_ext(&sgt[i])); > > > > dma_unmap_page(dev, qm_sg_addr(&sgt[i]), > > -- > > 2.17.1 > >
Powered by blists - more mailing lists