lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACKFLikYOcH59Psmtctx_xVRRoJPDm_few6aYu1fYPNrrN_N5g@mail.gmail.com>
Date:   Wed, 23 Nov 2022 11:14:05 -0800
From:   Michael Chan <michael.chan@...adcom.com>
To:     Ioannis Barkas <jnyb.de@...il.com>
Cc:     netdev@...r.kernel.org
Subject: Re: BCM4401 LAN

On Wed, Nov 23, 2022 at 10:42 AM Ioannis Barkas <jnyb.de@...il.com> wrote:
>
> Hello guys!
>
> I resurrected some old PCs at job and found one with BCM4401 LAN. This
> LAN had some issues as I read in various OSes so I gave it a try using
> live Ubuntu 22.10. It worked fine though I got this when I plugged in
> the Ethernet cable:
> [  517.928052] b44 ssb0:0 eth0: Link is up at 100 Mbps, full duplex
> [  517.928066] b44 ssb0:0 eth0: Flow control is off for TX and off for RX
> [  517.928246] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
> [  520.697405] ------------[ cut here ]------------
> [  520.697417] b44 0000:0a:0b.0: DMA addr 0x00000000766d9402+42
> overflow (mask 3fffffff, bus limit 0).
> [  520.697438] WARNING: CPU: 1 PID: 1187 at kernel/dma/direct.h:97
> dma_direct_map_page+0x1f1/0x200

I think you get this one-time warning because the DMA address is
higher than the 30-bit DMA address supported by the chip.  But the
driver will see the error returned from dma_map_single() and it will
copy the data to a bounce buffer.  So it should work fine despite this
alarming warning.

Download attachment "smime.p7s" of type "application/pkcs7-signature" (4209 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ