lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <168507422091.22221.15153316764967144660.git-patchwork-notify@kernel.org> Date: Fri, 26 May 2023 04:10:20 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Wei Fang <wei.fang@....com> Cc: davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, peppe.cavallaro@...com, alexandre.torgue@...s.st.com, joabreu@...opsys.com, pabeni@...hat.com, mcoquelin.stm32@...il.com, ast@...nel.org, daniel@...earbox.net, hawk@...nel.org, john.fastabend@...il.com, sdf@...gle.com, gerhard@...leder-embedded.com, lorenzo@...nel.org, simon.horman@...igine.com, netdev@...r.kernel.org, linux-stm32@...md-mailman.stormreply.com, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, bpf@...r.kernel.org Subject: Re: [PATCH net] net: stmmac: fix call trace when stmmac_xdp_xmit() is invoked Hello: This patch was applied to netdev/net.git (main) by Jakub Kicinski <kuba@...nel.org>: On Wed, 24 May 2023 20:57:14 +0800 you wrote: > From: Wei Fang <wei.fang@....com> > > We encountered a kernel call trace issue which was related to > ndo_xdp_xmit callback on our i.MX8MP platform. The reproduce > steps show as follows. > 1. The FEC port (eth0) connects to a PC port, and the PC uses > pktgen_sample03_burst_single_flow.sh to generate packets and > send these packets to the FEC port. Notice that the script must > be executed before step 2. > 2. Run the "./xdp_redirect eth0 eth1" command on i.MX8MP, the > eth1 interface is the dwmac. Then there will be a call trace > issue soon. Please see the log for more details. > The root cause is that the NETDEV_XDP_ACT_NDO_XMIT feature is > enabled by default, so when the step 2 command is exexcuted > and packets have already been sent to eth0, the stmmac_xdp_xmit() > starts running before the stmmac_xdp_set_prog() finishes. To > resolve this issue, we disable the NETDEV_XDP_ACT_NDO_XMIT > feature by default and turn on/off this feature when the bpf > program is installed/uninstalled which just like the other > ethernet drivers. > > [...] Here is the summary with links: - [net] net: stmmac: fix call trace when stmmac_xdp_xmit() is invoked https://git.kernel.org/netdev/net/c/ffb3322181d9 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists