On Thu, 2015-01-22 at 12:03 -0800, Iyappan Subramanian wrote:
> This patch fixes the following kernel crash,
> 
>       WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_input.c:3079 
> tcp_clean_rtx_queue+0x658/0x80c()
>       Call trace:

> 
> Software writes poison data into the descriptor bytes[15:8] and upon
> receiving the interrupt, if those bytes are overwritten by the hardware with
> the valid data, software also reads bytes[7:0] and executes receive/tx
> completion logic.
> 
> If the CPU executes the above two reads in out of order fashion, then the
> bytes[7:0] will have older data and causing the kernel panic.  We have to
> force the order of the reads and thus this patch introduces read memory
> barrier between these reads.
> 
> Signed-off-by: Iyappan Subramanian <isubraman...@apm.com>
> Signed-off-by: Keyur Chudgar <kchud...@apm.com>
> Tested-by: Mark Langsdorf <mlang...@redhat.com>
> ---
>  drivers/net/ethernet/apm/xgene/xgene_enet_main.c | 2 ++
>  1 file changed, 2 insertions(+)
> 
> diff --git a/drivers/net/ethernet/apm/xgene/xgene_enet_main.c 
> b/drivers/net/ethernet/apm/xgene/xgene_enet_main.c
> index 83a5028..3622cdb 100644
> --- a/drivers/net/ethernet/apm/xgene/xgene_enet_main.c
> +++ b/drivers/net/ethernet/apm/xgene/xgene_enet_main.c
> @@ -369,6 +369,8 @@ static int xgene_enet_process_ring(struct 
> xgene_enet_desc_ring *ring,
>               if (unlikely(xgene_enet_is_desc_slot_empty(raw_desc)))
>                       break;
>  
> +             /* read fpqnum field after dataaddr field */
> +             smp_rmb();
>               if (is_rx_desc(raw_desc))
>                       ret = xgene_enet_rx_frame(ring, raw_desc);
>               else

Reading your changelog, it looks like you need a plain rmb() here.



--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to