lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 23 Mar 2013 01:01:05 +0100
From:	Hannes Frederic Sowa <hannes@...essinduktion.org>
To:	rebelyouth <rebelyouth.hacklab@...il.com>
Cc:	netdev@...r.kernel.org
Subject: Re: Atheros Communications Inc. AR8121/AR8113/AR8114 Gigabit or Fast Ethernet (rev b0) 1.0.0.7 md5/sha1 corrupted using NFS and samba (updated) Version 2

On Fri, Mar 22, 2013 at 07:07:44PM -0400, rebelyouth wrote:
> 02:00.0 Ethernet controller: Atheros Communications Inc.
> 
> AR8121/AR8113/AR8114 Gigabit or Fast Ethernet (rev b0)
> 
> Subsystem: ASUSTeK Computer Inc. Device 831c
> 
> Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop-
> 
> ParErr- Stepping- SERR+ FastB2B- DisINTx+
> 
> Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort-
> 
> <TAbort- <MAbort- >SERR- <PERR- INTx-
> 
> Latency: 0, Cache Line Size: 64 bytes
> 
> Interrupt: pin A routed to IRQ 45
> 
> Region 0: Memory at fbfc0000 (64-bit, non-prefetchable) [size=256K]
> 
> Region 2: I/O ports at ec00 [size=128]
> 
> Capabilities: <access denied>
> 
> Kernel driver in use: ATL1E

Could you show us the capabilities (running lspci -vv as root)? Please check
if ASPM is enabled and try to disable it in the BIOS.

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ