lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <97c318af-956a-a26a-52f9-2875a8fe7bc7@arcor.de>
Date:   Tue, 7 Mar 2017 12:52:42 +0100
From:   Klaus Dittrich <kladit@...or.de>
To:     linux-kernel@...r.kernel.org
Subject: linux-4.10.1 "[Firmware Bug]: disabling VPD access"

mainboard GigaByte-Z77X-UD3H

[    0.000000] microcode: microcode updated early to revision 0x1c, date 
= 2015-02-26
[    0.000000] Linux version 4.10.1 (root@...g) (gcc version 6.3.1 
20170302 (GCC) ) #3 SMP PREEMPT Tue Mar 7 11:50:41 CET 2017
[    0.000000] Command line: BOOT_IMAGE=../vmlinuz-4.10.1 root=/dev/sda1 
ro rootfstype=ext4 file_caps=1

cpu
[    0.029577] smpboot: CPU0: Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz 
(family: 0x6, model: 0x3a, stepping: 0x9)


dmesg
..
[    0.586105] RPC: Registered tcp NFSv4.1 backchannel transport module.
[    0.586171] pci 0000:00:02.0: Video device with shadowed ROM at [mem 
0x000c0000-0x000dffff]

[    0.586656] PCI: CLS mismatch (64 != 32), using 64 bytes
[    0.586658] pci 0000:05:00.0: [Firmware Bug]: disabling VPD access 
(can't determine size of non-standard VPD format)

[    0.586777] PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
[    0.586839] software IO TLB [mem 0x99572000-0x9d572000] (64MB) mapped 
at [ffff880099572000-ffff88009d571fff]
..


I got the above firmware bug error message.
Is there a fix already?
Anything I can do?

-- 
Regards Klaus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ