lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Tue, 25 Mar 2014 13:41:37 +1100
From:	Maksim Lin <maks@...ichord.com>
To:	netdev@...r.kernel.org
Subject: Re: i217-LM boot wreckage

On Fri, 21 Mar 2014, Ertman, DavidX M wrote:

> I have discovered the cause of this issue.  It is related to the
> change in the application of a Si errata workaround.
>
> I will be working on grok'ing the total impact of this issue and
> writing up the patch over the weekend and will have something pushed
> into our internal queue early next week.

Hi,

Not sure if its helpful to have another report, but I'm pretty sure I
am seeing the same thing on my Dell Latitude 7440 running 3.14.0-rc7
but with a slightly different card:

$ ethtool -i eth0
driver: e1000e
version: 2.3.2-k
firmware-version: 0.6-3
bus-info: 0000:00:19.0
supports-statistics: yes
supports-test: yes
supports-eeprom-access: yes
supports-register-dump: yes

and from lspci -v:

00:19.0 Ethernet controller: Intel Corporation Ethernet Connection
I218-LM (rev 04)
    Subsystem: Dell Device 05cb
    Flags: bus master, fast devsel, latency 0, IRQ 59
    Memory at f7e00000 (32-bit, non-prefetchable) [size=128K]
    Memory at f7e3c000 (32-bit, non-prefetchable) [size=4K]
    I/O ports at f080 [size=32]
    Capabilities: <access denied>
    Kernel driver in use: e1000e
    Kernel modules: e1000e

I can try testing patches if it helps too.

thanks,
Maks.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ